Complement System in Dermatological Diseases – Fire Under the Skin
Panelius, Jaana; Meri, Seppo
2015-01-01
The complement system plays a key role in several dermatological diseases. Overactivation, deficiency, or abnormality of the control proteins are often related to a skin disease. Autoimmune mechanisms with autoantibodies and a cytotoxic effect of the complement membrane attack complex on epidermal or vascular cells can cause direct tissue damage and inflammation, e.g., in systemic lupus erythematosus (SLE), phospholipid antibody syndrome, and bullous skin diseases like pemphigoid. By evading complement attack, some microbes like Borrelia spirochetes and staphylococci can persist in the skin and cause prolonged symptoms. In this review, we present the most important skin diseases connected to abnormalities in the function of the complement system. Drugs having an effect on the complement system are also briefly described. On one hand, drugs with free hydroxyl on amino groups (e.g., hydralazine, procainamide) could interact with C4A, C4B, or C3 and cause an SLE-like disease. On the other hand, progress in studies on complement has led to novel anti-complement drugs (recombinant C1-inhibitor and anti-C5 antibody, eculizumab) that could alleviate symptoms in diseases associated with excessive complement activation. The main theme of the manuscript is to show how relevant the complement system is as an immune effector system in contributing to tissue injury and inflammation in a broad range of skin disorders. PMID:25688346
Rainer, Johannes; Rambach, Günter; Kaltseis, Josef; Hagleitner, Magdalena; Heiss, Silvia; Speth, Cornelia
2011-10-01
Representatives of the genus Pseudallescheria (anamorph: Scedosporium) are saprobes and the aetiologic agent of invasive mycosis in humans. After dissemination, the central nervous system (CNS) is one of the most affected organs. Prerequisites for the survival of Pseudallescheria/Scedosporium in the host are the ability to acquire nutrients and to evade the immune attack. The cleavage of complement compounds via the secretion of fungal proteases might meet both challenges since proteolytic degradation of proteins can provide nutrients and destroy the complement factors, a fast and effective immune weapon in the CNS. Therefore, we studied the capacity of different Pseudallescheria/Scedosporium species to degrade key elements of the complement cascade in the cerebrospinal fluid and investigated a correlation with the phylogenetic background. The majority of the Pseudallescheria apiosperma isolates tested were demonstrated to efficiently eliminate proteins like complement factors C3 and C1q, thus affecting two main components of a functional complement cascade, presumably by proteolytic degradation, and using them as nutrient source. In contrast, the tested strains of Pseudallescheria boydii have no or only weak capacity to eliminate these complement proteins. We hypothesise that the ability of Pseudallescheria/Scedosporium strains to acquire nutrients and to undermine the complement attack is at least partly phylogenetically determined. © 2011 Blackwell Verlag GmbH.
Hijacking Complement Regulatory Proteins for Bacterial Immune Evasion.
Hovingh, Elise S; van den Broek, Bryan; Jongerius, Ilse
2016-01-01
The human complement system plays an important role in the defense against invading pathogens, inflammation and homeostasis. Invading microbes, such as bacteria, directly activate the complement system resulting in the formation of chemoattractants and in effective labeling of the bacteria for phagocytosis. In addition, formation of the membrane attack complex is responsible for direct killing of Gram-negative bacteria. In turn, bacteria have evolved several ways to evade complement activation on their surface in order to be able to colonize and invade the human host. One important mechanism of bacterial escape is attraction of complement regulatory proteins to the microbial surface. These molecules are present in the human body for tight regulation of the complement system to prevent damage to host self-surfaces. Therefore, recruitment of complement regulatory proteins to the bacterial surface results in decreased complement activation on the microbial surface which favors bacterial survival. This review will discuss recent advances in understanding the binding of complement regulatory proteins to the bacterial surface at the molecular level. This includes, new insights that have become available concerning specific conserved motives on complement regulatory proteins that are favorable for microbial binding. Finally, complement evasion molecules are of high importance for vaccine development due to their dominant role in bacterial survival, high immunogenicity and homology as well as their presence on the bacterial surface. Here, the use of complement evasion molecules for vaccine development will be discussed.
Hijacking Complement Regulatory Proteins for Bacterial Immune Evasion
Hovingh, Elise S.; van den Broek, Bryan; Jongerius, Ilse
2016-01-01
The human complement system plays an important role in the defense against invading pathogens, inflammation and homeostasis. Invading microbes, such as bacteria, directly activate the complement system resulting in the formation of chemoattractants and in effective labeling of the bacteria for phagocytosis. In addition, formation of the membrane attack complex is responsible for direct killing of Gram-negative bacteria. In turn, bacteria have evolved several ways to evade complement activation on their surface in order to be able to colonize and invade the human host. One important mechanism of bacterial escape is attraction of complement regulatory proteins to the microbial surface. These molecules are present in the human body for tight regulation of the complement system to prevent damage to host self-surfaces. Therefore, recruitment of complement regulatory proteins to the bacterial surface results in decreased complement activation on the microbial surface which favors bacterial survival. This review will discuss recent advances in understanding the binding of complement regulatory proteins to the bacterial surface at the molecular level. This includes, new insights that have become available concerning specific conserved motives on complement regulatory proteins that are favorable for microbial binding. Finally, complement evasion molecules are of high importance for vaccine development due to their dominant role in bacterial survival, high immunogenicity and homology as well as their presence on the bacterial surface. Here, the use of complement evasion molecules for vaccine development will be discussed. PMID:28066340
More than just immune evasion: Hijacking complement by Plasmodium falciparum.
Schmidt, Christoph Q; Kennedy, Alexander T; Tham, Wai-Hong
2015-09-01
Malaria remains one of the world's deadliest diseases. Plasmodium falciparum is responsible for the most severe and lethal form of human malaria. P. falciparum's life cycle involves two obligate hosts: human and mosquito. From initial entry into these hosts, malaria parasites face the onslaught of the first line of host defence, the complement system. In this review, we discuss the complex interaction between complement and malaria infection in terms of hosts immune responses, parasite survival and pathogenesis of severe forms of malaria. We will focus on the role of complement receptor 1 and its associated polymorphisms in malaria immune complex clearance, as a mediator of parasite rosetting and as an entry receptor for P. falciparum invasion. Complement evasion strategies of P. falciparum parasites will also be highlighted. The sexual forms of the malaria parasites recruit the soluble human complement regulator Factor H to evade complement-mediated killing within the mosquito host. A novel evasion strategy is the deployment of parasite organelles to divert complement attack from infective blood stage parasites. Finally we outline the future challenge to understand the implications of these exploitation mechanisms in the interplay between successful infection of the host and pathogenesis observed in severe malaria. Copyright © 2015 Elsevier Ltd. All rights reserved.
Honda-Ogawa, Mariko; Ogawa, Taiji; Terao, Yutaka; Sumitomo, Tomoko; Nakata, Masanobu; Ikebe, Kazunori; Maeda, Yoshinobu; Kawabata, Shigetada
2013-05-31
Streptococcus pyogenes is an important human pathogen that causes invasive diseases such as necrotizing fasciitis, sepsis, and streptococcal toxic shock syndrome. We investigated the function of a major cysteine protease from S. pyogenes that affects the amount of C1-esterase inhibitor (C1-INH) and other complement factors and aimed to elucidate the mechanism involved in occurrence of streptococcal toxic shock syndrome from the aspect of the complement system. First, we revealed that culture supernatant of a given S. pyogenes strain and recombinant SpeB degraded the C1-INH. Then, we determined the N-terminal sequence of the C1-INH fragment degraded by recombinant SpeB. Interestingly, the region containing one of the identified cleavage sites is not present in patients with C1-INH deficiency. Scanning electron microscopy of the speB mutant incubated in human serum showed the abnormal superficial architecture and irregular oval structure. Furthermore, unlike the wild-type strain, that mutant strain showed lower survival capacity than normal as compared with heat-inactivated serum, whereas it had a significantly higher survival rate in serum without the C1-INH than in normal serum. Also, SpeB degraded multiple complement factors and the membrane attack complex. Flow cytometric analyses revealed deposition of C9, one of the components of membrane the attack complex, in greater amounts on the surface of the speB mutant, whereas lower amounts of C9 were bound to the wild-type strain surface. These results suggest that SpeB can interrupt the human complement system via degrading the C1-INH, thus enabling S. pyogenes to evade eradication in a hostile environment.
Structural basis for complement evasion by Lyme disease pathogen Borrelia burgdorferi.
Bhattacharjee, Arnab; Oeemig, Jesper S; Kolodziejczyk, Robert; Meri, Taru; Kajander, Tommi; Lehtinen, Markus J; Iwaï, Hideo; Jokiranta, T Sakari; Goldman, Adrian
2013-06-28
Borrelia burgdorferi spirochetes that cause Lyme borreliosis survive for a long time in human serum because they successfully evade the complement system, an important arm of innate immunity. The outer surface protein E (OspE) of B. burgdorferi is needed for this because it recruits complement regulator factor H (FH) onto the bacterial surface to evade complement-mediated cell lysis. To understand this process at the molecular level, we used a structural approach. First, we solved the solution structure of OspE by NMR, revealing a fold that has not been seen before in proteins involved in complement regulation. Next, we solved the x-ray structure of the complex between OspE and the FH C-terminal domains 19 and 20 (FH19-20) at 2.83 Å resolution. The structure shows that OspE binds FH19-20 in a way similar to, but not identical with, that used by endothelial cells to bind FH via glycosaminoglycans. The observed interaction of OspE with FH19-20 allows the full function of FH in down-regulation of complement activation on the bacteria. This reveals the molecular basis for how B. burgdorferi evades innate immunity and suggests how OspE could be used as a potential vaccine antigen.
The Surface-Exposed Protein SntA Contributes to Complement Evasion in Zoonotic Streptococcus suis.
Deng, Simin; Xu, Tong; Fang, Qiong; Yu, Lei; Zhu, Jiaqi; Chen, Long; Liu, Jiahui; Zhou, Rui
2018-01-01
Streptococcus suis is an emerging zoonotic pathogen causing streptococcal toxic shock like syndrome (STSLS), meningitis, septicemia, and even sudden death in human and pigs. Serious septicemia indicates this bacterium can evade the host complement surveillance. In our previous study, a functionally unknown protein SntA of S. suis has been identified as a heme-binding protein, and contributes to virulence in pigs. SntA can interact with the host antioxidant protein AOP2 and consequently inhibit its antioxidant activity. In the present study, SntA is identified as a cell wall anchored protein that functions as an important player in S. suis complement evasion. The C3 deposition and membrane attack complex (MAC) formation on the surface of sntA -deleted mutant strain Δ sntA are demonstrated to be significantly higher than the parental strain SC-19 and the complementary strain CΔ sntA . The abilities of anti-phagocytosis, survival in blood, and in vivo colonization of Δ sntA are obviously reduced. SntA can interact with C1q and inhibit hemolytic activity via the classical pathway. Complement activation assays reveal that SntA can also directly activate classical and lectin pathways, resulting in complement consumption. These two complement evasion strategies may be crucial for the pathogenesis of this zoonotic pathogen. Concerning that SntA is a bifunctional 2',3'-cyclic nucleotide 2'-phosphodiesterase/3'-nucleotidase in many species of Gram-positive bacteria, these complement evasion strategies may have common biological significance.
Khattab, Ayman; Barroso, Marta; Miettinen, Tiera; Meri, Seppo
2015-01-01
Hematophagous vectors strictly require ingesting blood from their hosts to complete their life cycles. Exposure of the alimentary canal of these vectors to the host immune effectors necessitates efficient counteractive measures by hematophagous vectors. The Anopheles mosquito transmitting the malaria parasite is an example of hematophagous vectors that within seconds can ingest human blood double its weight. The innate immune defense mechanisms, like the complement system, in the human blood should thereby immediately react against foreign cells in the mosquito midgut. A prerequisite for complement activation is that the target cells lack complement regulators on their surfaces. In this work, we analyzed whether human complement is active in the mosquito midgut, and how the mosquito midgut cells protect themselves against complement attack. We found that complement remained active for a considerable time and was able to kill microbes within the mosquito midgut. However, the Anopheles mosquito midgut cells were not injured. These cells were found to protect themselves by capturing factor H, the main soluble inhibitor of the alternative complement pathway. Factor H inhibited complement on the midgut cells by promoting inactivation of C3b to iC3b and preventing the activity of the alternative pathway amplification C3 convertase enzyme. An interference of the FH regulatory activity by monoclonal antibodies, carried to the midgut via blood, resulted in increased mosquito mortality and reduced fecundity. By using a ligand blotting assay, a putative mosquito midgut FH receptor could be detected. Thereby, we have identified a novel mechanism whereby mosquitoes can tolerate human blood. PMID:25679788
Complement evasion by Bordetella pertussis: implications for improving current vaccines.
Jongerius, Ilse; Schuijt, Tim J; Mooi, Frits R; Pinelli, Elena
2015-04-01
Bordetella pertussis causes whooping cough or pertussis, a highly contagious disease of the respiratory tract. Despite high vaccination coverage, reported cases of pertussis are rising worldwide and it has become clear that the current vaccines must be improved. In addition to the well-known protective role of antibodies and T cells during B. pertussis infection, innate immune responses such as the complement system play an essential role in B. pertussis killing. In order to evade this complement activation and colonize the human host, B. pertussis expresses several molecules that inhibit complement activation. Interestingly, one of the known complement evasion proteins, autotransporter Vag8, is highly expressed in the recently emerged B. pertussis isolates. Here, we describe the current knowledge on how B. pertussis evades complement-mediated killing. In addition, we compare this to complement evasion strategies used by other bacterial species. Finally, we discuss the consequences of complement evasion by B. pertussis on adaptive immunity and how identification of the bacterial molecules and the mechanisms involved in complement evasion might help improve pertussis vaccines.
Cyber-Physical Attacks With Control Objectives
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-08-18
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Cyber-Physical Attacks With Control Objectives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
van der Maten, Erika; van den Broek, Bryan; de Jonge, Marien I; Rensen, Kim J W; Eleveld, Marc J; Zomer, Aldert L; Cremers, Amelieke J H; Ferwerda, Gerben; de Groot, Ronald; Langereis, Jeroen D; van der Flier, Michiel
2018-04-01
The pneumococcal capsular serotype is an important determinant of complement resistance and invasive disease potential, but other virulence factors have also been found to contribute. Pneumococcal surface protein C (PspC), a highly variable virulence protein that binds complement factor H to evade C3 opsonization, is divided into two subgroups: choline-bound subgroup I and LPxTG-anchored subgroup II. The prevalence of different PspC subgroups in invasive pneumococcal disease (IPD) and functional differences in complement evasion are unknown. The prevalence of PspC subgroups in IPD isolates was determined in a collection of 349 sequenced strains of Streptococcus pneumoniae isolated from adult patients. pspC deletion mutants and isogenic pspC switch mutants were constructed to study differences in factor H binding and complement evasion in relation to capsule thickness. Subgroup I pspC was far more prevalent in IPD isolates than subgroup II pspC The presence of capsule was associated with a greater ability of bound factor H to reduce complement opsonization. Pneumococcal subgroup I PspC bound significantly more factor H and showed more effective complement evasion than subgroup II PspC in isogenic encapsulated pneumococci. We conclude that variation in the PspC subgroups, independent of capsule serotypes, affects pneumococcal factor H binding and its ability to evade complement deposition. Copyright © 2018 American Society for Microbiology.
Marcinkiewicz, Ashley L; Kraiczy, Peter; Lin, Yi-Pin
2017-01-01
Lyme disease and relapsing fever are caused by various Borrelia species. Lyme disease borreliae , the most common vector-borne pathogens in both the U.S. and Europe, are transmitted by Ixodes ticks and disseminate from the site of tick bites to tissues leading to erythema migrans skin rash, arthritis, carditis, and neuroborreliosis. Relapsing fever borreliae , carried by ticks and lice, trigger reoccurring fever episodes. Following transmission, spirochetes survive in the blood to induce bacteremia at the early stages of infection, which is thought to promote evasion of the host complement system. The complement system acts as an important innate immune defense mechanism in humans and vertebrates. Upon activation, the cleaved complement components form complexes on the pathogen surface to eventually promote bacteriolysis. The complement system is negatively modulated by a number of functionally diverse regulators to avoid tissue damage. To evade and inhibit the complement system, spirochetes are capable of binding complement components and regulators. Complement inhibition results in bacterial survival in serum (serum resistance) and is thought to promote bloodstream survival, which facilitates spirochete dissemination and disease manifestations. In this review, we discuss current methodologies to elucidate the mechanisms of Borrelia spp. that promote serum resistance and bloodstream survival, as well as novel methods to study factors responsible for bloodstream survival of Lyme disease borreliae that can be applied to relapsing fever borreliae . Understanding the mechanisms these pathogens utilize to evade the complement system will ultimately aid in the development of novel therapeutic strategies and disease prevention to improve human health.
Adler Sørensen, Camilla; Rosbjerg, Anne; Hebbelstrup Jensen, Betina; Krogfelt, Karen Angeliki; Garred, Peter
2018-01-01
Enteroaggregative Escherichia coli (EAEC) causes acute and persistent diarrhea worldwide. Still, the involvement of host factors in EAEC infections is unresolved. Binding of recognition molecules from the lectin pathway of complement to EAEC strains have been observed, but the importance is not known. Our aim was to uncover the involvement of these molecules in innate complement dependent immune protection toward EAEC. Binding of mannose-binding lectin, ficolin-1, -2, and -3 to four prototypic EAEC strains, and ficolin-2 binding to 56 clinical EAEC isolates were screened by a consumption-based ELISA method. Flow cytometry was used to determine deposition of C4b, C3b, and the bactericidal C5b-9 membrane attack complex (MAC) on the bacteria in combination with different complement inhibitors. In addition, the direct serum bactericidal effect was assessed. Screening of the prototypic EAEC strains revealed that ficolin-2 was the major binder among the lectin pathway recognition molecules. However, among the clinical EAEC isolates only a restricted number ( n = 5) of the isolates bound ficolin-2. Using the ficolin-2 binding isolate C322-17 as a model, we found that incubation with normal human serum led to deposition of C4b, C3b, and to MAC formation. No inhibition of complement deposition was observed when a C1q inhibitor was added, while partial inhibition was observed when ficolin-2 or factor D inhibitors were used separately. Combining the inhibitors against ficolin-2 and factor D led to virtually complete inhibition of complement deposition and protection against direct bacterial killing. These results demonstrate that ficolin-2 may play an important role in innate immune protection against EAEC when an appropriate ligand is exposed, but many EAEC strains evade lectin pathway recognition and may, therefore, circumvent this strategy of innate host immune protection.
Wooster, David G; Maruvada, Ravi; Blom, Anna M; Prasadarao, Nemani V
2006-01-01
Meningitis caused by Escherichia coli K1 is a serious illness in neonates with neurological sequelae in up to 50% of survivors. A high degree of bacteremia is required for E. coli K1 to cross the blood–brain barrier, which suggests that the bacterium must evade the host defence mechanisms and survive in the bloodstream. We previously showed that outer membrane protein A (OmpA) of E. coli binds C4b-binding protein (C4bp), an inhibitor of complement activation via the classical pathway. Nevertheless, the exact mechanism by which E. coli K1 survives in serum remains elusive. Here, we demonstrate that log phase (LP) OmpA+E. coli K1 avoids serum bactericidal activity more effectively than postexponential phase bacteria. OmpA–E. coli cannot survive in serum grown to either phase. The increased serum resistance of LP OmpA+E. coli is the result of increased binding of C4bp, with a concomitant decrease in the deposition of C3b and the downstream complement proteins responsible for the formation of the membrane attack complex. C4bp bound to E. coli K1 acts as a cofactor to factor I in the cleavage of both C3b and C4b, which shuts down the ensuing complement cascade. Accordingly, a peptide corresponding to the complement control protein domain 3 of C4bp sequence, was able to compete with C4bp binding to OmpA and cause increased deposition of C3b. Thus, binding of C4bp appears to be responsible for survival of E. coli K1 in human serum. PMID:16556262
Sequestration of host-CD59 as potential immune evasion strategy of Trichomonas vaginalis.
Ibáñez-Escribano, Alexandra; Nogal-Ruiz, Juan José; Pérez-Serrano, Jorge; Gómez-Barrio, Alicia; Escario, J Antonio; Alderete, J F
2015-09-01
Trichomonas vaginalis is known to evade complement-mediated lysis. Because the genome of T. vaginalis does not possess DNA sequence with homology to human protectin (CD59), a complement lysis restricting factor, we tested the hypothesis that host CD59 acquisition by T. vaginalis organisms mediates resistance to complement killing. This hypothesis was based on the fact that trichomonads are known to associate with host proteins. No CD59 was detected on the surface of T. vaginalis grown in serum-based medium using as probe anti-CD59 monoclonal antibody (MAb). We, therefore, infected mice intraperitoneally with live T. vaginalis, and trichomonads harvested from ascites were tested for binding of CD59. Immunofluorescence showed that parasites had surface CD59. Furthermore, as mouse erythrocytes (RBCs) possess membrane-associated CD59, and trichomonads use RBCs as a nutrient source, organisms were co-cultured with murine RBCs for one week. Parasites were shown to have detectable surface CD59. Importantly, live T. vaginalis with bound CD59 were compared with batch-grown parasites without surface-associated CD59 for sensitivity to complement in human serum. Trichomonads without surface-bound CD59 had a higher level of killing by complement than did parasites with surface CD59. These data show that host CD59 acquired onto the surface by live T. vaginalis may be an alternative mechanism for complement evasion. We describe a novel strategy by T. vaginalis consistent with host protein procurement by this parasite to evade the lytic action of complement. Copyright © 2015 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Kelley, H. J.; Lefton, L.
1976-01-01
The numerical analysis of composite differential-turn trajectory pairs was studied for 'fast-evader' and 'neutral-evader' attitude dynamics idealization for attack aircraft. Transversality and generalized corner conditions are examined and the joining of trajectory segments discussed. A criterion is given for the screening of 'tandem-motion' trajectory segments. Main focus is upon the computation of barrier surfaces. Fortunately, from a computational viewpoint, the trajectory pairs defining these surfaces need not be calculated completely, the final subarc of multiple-subarc pairs not being required. Some calculations for pairs of example aircraft are presented. A computer program used to perform the calculations is included.
Protective responses to sublytic complement in the retinal pigment epithelium
Tan, Li Xuan; Toops, Kimberly A.; Lakkaraju, Aparna
2016-01-01
The retinal pigment epithelium (RPE) is a key site of injury in inherited and age-related macular degenerations. Abnormal activation of the complement system is a feature of these blinding diseases, yet how the RPE combats complement attack is poorly understood. The complement cascade terminates in the cell-surface assembly of membrane attack complexes (MACs), which promote inflammation by causing aberrant signal transduction. Here, we investigated mechanisms crucial for limiting MAC assembly and preserving cellular integrity in the RPE and asked how these are compromised in models of macular degeneration. Using polarized primary RPE and the pigmented Abca4−/− Stargardt disease mouse model, we provide evidence for two protective responses occurring within minutes of complement attack, which are essential for maintaining mitochondrial health in the RPE. First, accelerated recycling of the membrane-bound complement regulator CD59 to the RPE cell surface inhibits MAC formation. Second, fusion of lysosomes with the RPE plasma membrane immediately after complement attack limits sustained elevations in intracellular calcium and prevents mitochondrial injury. Cholesterol accumulation in the RPE, induced by vitamin A dimers or oxidized LDL, inhibits these defense mechanisms by activating acid sphingomyelinase (ASMase), which increases tubulin acetylation and derails organelle traffic. Defective CD59 recycling and lysosome exocytosis after complement attack lead to mitochondrial fragmentation and oxidative stress in the RPE. Drugs that stimulate cholesterol efflux or inhibit ASMase restore both these critical safeguards in the RPE and avert complement-induced mitochondrial injury in vitro and in Abca4−/− mice, indicating that they could be effective therapeutic approaches for macular degenerations. PMID:27432952
Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students
ERIC Educational Resources Information Center
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.
2017-01-01
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Zhang, Zhifei; Yang, Jing; Wei, Junfei; Yang, Yaping; Chen, Xiaoqin; Zhao, Xi; Gu, Yuan; Cui, Shijuan; Zhu, Xinping
2011-01-01
Background Paramyosin is a thick myofibrillar protein found exclusively in invertebrates. Evidence suggested that paramyosin from helminths serves not only as a structural protein but also as an immunomodulatory agent. We previously reported that recombinant Trichinella spiralis paramyosin (Ts-Pmy) elicited a partial protective immunity in mice. In this study, the ability of Ts-Pmy to bind host complement components and protect against host complement attack was investigated. Methods and Findings In this study, the transcriptional and protein expression levels of Ts-Pmy were determined in T. spiralis newborn larva (NBL), muscle larva (ML) and adult worm developmental stages by RT-PCR and western blot analysis. Expression of Ts-Pmy at the outer membrane was observed in NBL and adult worms using immunogold electron microscopy and immunofluorescence staining. Functional analysis revealed that recombinant Ts-Pmy(rTs-Pmy) strongly bound to complement components C8 and C9 and inhibited the polymerization of C9 during the formation of the membrane attack complex (MAC). rTs-Pmy also inhibited the lysis of rabbit erythrocytes (ER) elicited by an alternative pathway-activated complement from guinea pig serum. Inhibition of native Ts-Pmy on the surface of NBL with a specific antiserum reduced larvae viability when under the attack of complement in vitro. In vivo passive transfer of anti-Ts-Pmy antiserum and complement-treated larvae into mice also significantly reduced the number of larvae that developed to ML. Conclusion These studies suggest that the outer membrane form of T. spiralis paramyosin plays an important role in the evasion of the host complement attack. PMID:21750743
USDA-ARS?s Scientific Manuscript database
Antigenic variation allows microbial pathogens to evade immune clearance and establish persistent infection. Anaplasma marginale utilizes gene conversion of a repertoire of silent msp2 alleles into a single active expression site to encode unique Msp2 variants. As the genomic complement of msp2 alle...
Randomized Prediction Games for Adversarial Machine Learning.
Rota Bulo, Samuel; Biggio, Battista; Pillai, Ignazio; Pelillo, Marcello; Roli, Fabio
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.
2016-05-13
Storm. 35 Allied planners determined that TLAMs would be ineffective because they could not provide Battle Damage Assessment ( BDA ) and confirm...that the Apache’s armament, capability of flying low enough to evade radar, and ability to confirm BDA provided the best option to destroy the radar
T-Cell Warriors—Equipped to Kill Cancer Cells | Center for Cancer Research
When the body recognizes tumor cells as foreign, a natural immune response arises to attack them. Unfortunately, tumors have ways to evade immune surveillance systems and antitumor responses are often too weak to defeat the disease. Rather than relying on the body’s natural response, scientists can now manipulate a patient’s own immune cells so that they latch on to tumor
Complement factor H in host defense and immune evasion.
Parente, Raffaella; Clark, Simon J; Inforzato, Antonio; Day, Anthony J
2017-05-01
Complement is the major humoral component of the innate immune system. It recognizes pathogen- and damage-associated molecular patterns, and initiates the immune response in coordination with innate and adaptive immunity. When activated, the complement system unleashes powerful cytotoxic and inflammatory mechanisms, and thus its tight control is crucial to prevent damage to host tissues and allow restoration of immune homeostasis. Factor H is the major soluble inhibitor of complement, where its binding to self markers (i.e., particular glycan structures) prevents complement activation and amplification on host surfaces. Not surprisingly, mutations and polymorphisms that affect recognition of self by factor H are associated with diseases of complement dysregulation, such as age-related macular degeneration and atypical haemolytic uremic syndrome. In addition, pathogens (i.e., non-self) and cancer cells (i.e., altered-self) can hijack factor H to evade the immune response. Here we review recent (and not so recent) literature on the structure and function of factor H, including the emerging roles of this protein in the pathophysiology of infectious diseases and cancer.
Du, Yiqun; Teng, Xiaoyan; Wang, Na; Zhang, Xin; Chen, Jianfeng; Ding, Peipei; Qiao, Qian; Wang, Qingkai; Zhang, Long; Yang, Chaoqun; Yang, Zhangmin; Chu, Yiwei; Du, Xiang; Zhou, Xuhui; Hu, Weiguo
2014-01-31
The complement system can be activated spontaneously for immune surveillance or induced to clear invading pathogens, in which the membrane attack complex (MAC, C5b-9) plays a critical role. CD59 is the sole membrane complement regulatory protein (mCRP) that restricts MAC assembly. CD59, therefore, protects innocent host cells from attacks by the complement system, and host cells require the constitutive and inducible expression of CD59 to protect themselves from deleterious destruction by complement. However, the mechanisms that underlie CD59 regulation remain largely unknown. In this study we demonstrate that the widely expressed transcription factor Sp1 may regulate the constitutive expression of CD59, whereas CREB-binding protein (CBP)/p300 bridge NF-κB and CREB, which surprisingly functions as an enhancer-binding protein to induce the up-regulation of CD59 during in lipopolysaccharide (LPS)-triggered complement activation, thus conferring host defense against further MAC-mediated destruction. Moreover, individual treatment with LPS, TNF-α, and the complement activation products (sublytic MAC (SC5b-9) and C5a) could increase the expression of CD59 mainly by activating NF-κB and CREB signaling pathways. Together, our findings identify a novel gene regulation mechanism involving CBP/p300, NF-κB, and CREB; this mechanism suggests potential drug targets for controlling various complement-related human diseases.
The Role of Hypoxia in the Tumor Microenvironment: Implications for Ovarian Cancer Therapy
2017-07-01
microenvironmental factor promoting metastatic progression. A critical step in metastatic tumor progression is the ability of tumor cells to evade immune attack...Tumor cells utilize a complex set of mechanisms that prevent the immune system from mounting effective anti-tumor responses. Moreover, the hypoxic...promote the immunosuppressive phenotypes of both tumor cells as well as infiltrating immune cells . However, the mechanisms by which hypoxia promotes
Adversarial Feature Selection Against Evasion Attacks.
Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio
2016-03-01
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Brian S; Wu, Yifu; Wei, Jin
Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS)more » information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias
Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service informationmore » to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
Zhao, Xin; Chen, Yun-Xia; Li, Chun-Sheng
2015-04-01
To investigate changes in circulating complement component C3, membrane attack complex (MAC), and mannose-binding lectin (MBL) in patients with sepsis-induced disseminated intravascular coagulation (DIC). Adult septic patients admitted to the emergency department (ED) of Beijing Chao-Yang Hospital were enrolled. A DIC score of 5 or higher was considered sepsis-induced DIC. Circulating C3, MAC, and MBL levels were detected on ED arrival and compared between patients with and without DIC. The predictive value of C3, MAC, and MBL for sepsis-induced DIC at ED arrival and development of DIC after admission were assessed by receiver operating characteristic curve and logistic regression. We enrolled 267 septic patients between February and December 2013. Complement 3, MAC, and MBL were higher in the DIC group (P < .01). Membrane attack complex was the independent predictor of sepsis-induced DIC. The area under the curve of MAC in predicting sepsis-induced DIC was 0.793. During hospitalization, 25 patients without DIC at enrollment developed DIC. Membrane attack complex and Sequential Organ Failure Assessment independently predicted progress to DIC. The area under the curve of MAC was 0.741. Complement 3, MAC, and MBL were significantly increased in septic patients with DIC. Membrane attack complex independently predicted sepsis-induced DIC and development of DIC after ED admission. Copyright © 2014 Elsevier Inc. All rights reserved.
Anti-Immune Strategies of Pathogenic Fungi
Marcos, Caroline M.; de Oliveira, Haroldo C.; de Melo, Wanessa de Cássia M. Antunes; da Silva, Julhiany de Fátima; Assato, Patrícia A.; Scorzoni, Liliana; Rossi, Suélen A.; de Paula e Silva, Ana C. A.; Mendes-Giannini, Maria J. S.; Fusco-Almeida, Ana M.
2016-01-01
Pathogenic fungi have developed many strategies to evade the host immune system. Multiple escape mechanisms appear to function together to inhibit attack by the various stages of both the adaptive and the innate immune response. Thus, after entering the host, such pathogens fight to overcome the immune system to allow their survival, colonization and spread to different sites of infection. Consequently, the establishment of a successful infectious process is closely related to the ability of the pathogen to modulate attack by the immune system. Most strategies employed to subvert or exploit the immune system are shared among different species of fungi. In this review, we summarize the main strategies employed for immune evasion by some of the major pathogenic fungi. PMID:27896220
Bacillus anthracis Interacts with Plasmin(ogen) to Evade C3b-Dependent Innate Immunity
Chung, Myung-Chul; Tonry, Jessica H.; Narayanan, Aarthi; Manes, Nathan P.; Mackie, Ryan S.; Gutting, Bradford; Mukherjee, Dhritiman V.; Popova, Taissia G.; Kashanchi, Fatah; Bailey, Charles L.; Popov, Serguei G.
2011-01-01
The causative agent of anthrax, Bacillus anthracis, is capable of circumventing the humoral and innate immune defense of the host and modulating the blood chemistry in circulation to initiate a productive infection. It has been shown that the pathogen employs a number of strategies against immune cells using secreted pathogenic factors such as toxins. However, interference of B. anthracis with the innate immune system through specific interaction of the spore surface with host proteins such as the complement system has heretofore attracted little attention. In order to assess the mechanisms by which B. anthracis evades the defense system, we employed a proteomic analysis to identify human serum proteins interacting with B. anthracis spores, and found that plasminogen (PLG) is a major surface-bound protein. PLG efficiently bound to spores in a lysine- and exosporium-dependent manner. We identified α-enolase and elongation factor tu as PLG receptors. PLG-bound spores were capable of exhibiting anti-opsonic properties by cleaving C3b molecules in vitro and in rabbit bronchoalveolar lavage fluid, resulting in a decrease in macrophage phagocytosis. Our findings represent a step forward in understanding the mechanisms involved in the evasion of innate immunity by B. anthracis through recruitment of PLG resulting in the enhancement of anti-complement and anti-opsonization properties of the pathogen. PMID:21464960
Conde, Jonas Nascimento; da Silva, Emiliana Mandarano; Allonso, Diego; Coelho, Diego Rodrigues; Andrade, Iamara da Silva; de Medeiros, Luciano Neves; Menezes, Joice Lima; Barbosa, Angela Silva
2016-01-01
ABSTRACT Dengue virus (DENV) infects millions of people worldwide and is a major public health problem. DENV nonstructural protein 1 (NS1) is a conserved glycoprotein that associates with membranes and is also secreted into the plasma in DENV-infected patients. The present study describes a novel mechanism by which NS1 inhibits the terminal complement pathway. We first identified the terminal complement regulator vitronectin (VN) as a novel DENV2 NS1 binding partner by using a yeast two-hybrid system. This interaction was further assessed by enzyme-linked immunosorbent assay (ELISA) and surface plasmon resonance (SPR) assay. The NS1-VN complex was also detected in plasmas from DENV-infected patients, suggesting that this interaction occurs during DENV infection. We also demonstrated that the DENV2 NS1 protein, either by itself or by interacting with VN, hinders the formation of the membrane attack complex (MAC) and C9 polymerization. Finally, we showed that DENV2, West Nile virus (WNV), and Zika virus (ZIKV) NS1 proteins produced in mammalian cells inhibited C9 polymerization. Taken together, our results points to a role for NS1 as a terminal pathway inhibitor of the complement system. IMPORTANCE Dengue is the most important arthropod-borne viral disease nowadays and is caused by dengue virus (DENV). The flavivirus NS1 glycoprotein has been characterized functionally as a complement evasion protein that can attenuate the activation of the classical, lectin, and alternative pathways. The present study describes a novel mechanism by which DENV NS1 inhibits the terminal complement pathway. We identified the terminal complement regulator vitronectin (VN) as a novel DENV NS1 binding partner, and the NS1-VN complex was detected in plasmas from DENV-infected patients, suggesting that this interaction occurs during DENV infection. We also demonstrated that the NS1-VN complex inhibited membrane attack complex (MAC) formation, thus interfering with the complement terminal pathway. Interestingly, NS1 itself also inhibited MAC activity, suggesting a direct role of this protein in the inhibition process. Our findings imply a role for NS1 as a terminal pathway inhibitor of the complement system. PMID:27512066
Honda-Ogawa, Mariko; Sumitomo, Tomoko; Mori, Yasushi; Hamd, Dalia Talat; Ogawa, Taiji; Yamaguchi, Masaya; Nakata, Masanobu; Kawabata, Shigetada
2017-01-01
Streptococcus pyogenes secretes various virulence factors for evasion from complement-mediated bacteriolysis. However, full understanding of the molecules possessed by this organism that interact with complement C1q, an initiator of the classical complement pathway, remains elusive. In this study, we identified an endopeptidase of S. pyogenes, PepO, as an interacting molecule, and investigated its effects on complement immunity and pathogenesis. Enzyme-linked immunosorbent assay and surface plasmon resonance analysis findings revealed that S. pyogenes recombinant PepO bound to human C1q in a concentration-dependent manner under physiological conditions. Sites of inflammation are known to have decreased pH levels, thus the effects of PepO on bacterial evasion from complement immunity was analyzed in a low pH condition. Notably, under low pH conditions, PepO exhibited a higher affinity for C1q as compared with IgG, and PepO inhibited the binding of IgG to C1q. In addition, pepO deletion rendered S. pyogenes more susceptible to the bacteriocidal activity of human serum. Also, observations of the morphological features of the pepO mutant strain (ΔpepO) showed damaged irregular surfaces as compared with the wild-type strain (WT). WT-infected tissues exhibited greater severity and lower complement activity as compared with those infected by ΔpepO in a mouse skin infection model. Furthermore, WT infection resulted in a larger accumulation of C1q than that with ΔpepO. Our results suggest that interaction of S. pyogenes PepO with C1q interferes with the complement pathway, which enables S. pyogenes to evade complement-mediated bacteriolysis under acidic conditions, such as seen in inflammatory sites. PMID:28154192
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Rajivan, Prashanth; Gonzalez, Cleotilde
2018-01-01
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails. PMID:29515478
Barata, Lidia; Miwa, Takashi; Sato, Sayaka; Kim, David; Mohammed, Imran; Song, Wen-Chao
2013-03-15
Complement receptor 1-related gene/protein y (Crry) and decay-accelerating factor (DAF) are two murine membrane C3 complement regulators with overlapping functions. Crry deletion is embryonically lethal whereas DAF-deficient mice are generally healthy. Crry(-/-)DAF(-/-) mice were viable on a C3(-/-) background, but platelets from such mice were rapidly destroyed when transfused into C3-sufficient mice. In this study, we used the cre-lox system to delete platelet Crry in DAF(-/-) mice and studied Crry/DAF-deficient platelet development in vivo. Rather than displaying thrombocytopenia, Pf4-Cre(+)-Crry(flox/flox) mice had normal platelet counts and their peripheral platelets were resistant to complement attack. However, chimera mice generated with Pf4-Cre(+)-Crry(flox/flox) bone marrows showed platelets from C3(-/-) but not C3(+/+) recipients to be sensitive to complement activation, suggesting that circulating platelets in Pf4-Cre(+)-Crry(flox/flox) mice were naturally selected in a complement-sufficient environment. Notably, Pf4-Cre(+)-Crry(flox/flox) mouse platelets became complement susceptible when factor H function was blocked. Examination of Pf4-Cre(+)-Crry(flox/flox) mouse bone marrows revealed exceedingly active thrombopoiesis. Thus, under in vivo conditions, Crry/DAF deficiency on platelets led to abnormal platelet turnover, but peripheral platelet count was compensated for by increased thrombopoiesis. Selective survival of Crry/DAF-deficient platelets aided by factor H protection and compensatory thrombopoiesis demonstrates the cooperation between membrane and fluid phase complement inhibitors and the body's ability to adaptively respond to complement regulator deficiencies.
2012-04-01
293: R243-R250. Rittweger, J. and Felsenberg, D. 2009. Recovery of muscle atrophy and bone loss from 90 days bed rest: Results from a one-year...changes such as bone and muscle loss . Stress of all types, as well as microgravity, compromise the immune system (Convertino, 2007). Microgravity...proportion of space travelers during the first two to four days of flight (and sometimes on return to Earth) has evaded reliable preventive treatment
How moths escape bats: predicting outcomes of predator-prey interactions.
Corcoran, Aaron J; Conner, William E
2016-09-01
What determines whether fleeing prey escape from attacking predators? To answer this question, biologists have developed mathematical models that incorporate attack geometries, pursuit and escape trajectories, and kinematics of predator and prey. These models have rarely been tested using data from actual predator-prey encounters. To address this problem, we recorded multi-camera infrared videography of bat-insect interactions in a large outdoor enclosure. We documented 235 attacks by four Myotis volans bats on a variety of moths. Bat and moth flight trajectories from 50 high-quality attacks were reconstructed in 3-D. Despite having higher maximum velocity, deceleration and overall turning ability, bats only captured evasive prey in 69 of 184 attacks (37.5%); bats captured nearly all moths not evading attack (50 of 51; 98%). Logistic regression indicated that prey radial acceleration and escape angle were the most important predictors of escape success (44 of 50 attacks correctly classified; 88%). We found partial support for the turning gambit mathematical model; however, it underestimated the escape threshold by 25% of prey velocity and did not account for prey escape angle. Whereas most prey escaping strikes flee away from predators, moths typically escaped chasing bats by turning with high radial acceleration toward 'safety zones' that flank the predator. This strategy may be widespread in prey engaged in chases. Based on these findings, we developed a novel geometrical model of predation. We discuss implications of this model for the co-evolution of predator and prey kinematics and pursuit and escape strategies. © 2016. Published by The Company of Biologists Ltd.
The Changing Nature of Suicide Attacks: A Social Network Perspective
ERIC Educational Resources Information Center
Pedahzur, Ami; Perliger, Arie
2006-01-01
To comprehend the developments underlying the suicide attacks of recent years, we suggest that the organizational approach, which until recently was used to explain this phenomenon, should be complemented with a social network perspective. By employing a social network analysis of Palestinian suicide networks, the authors found that, in contrast…
Conde, Jonas Nascimento; da Silva, Emiliana Mandarano; Allonso, Diego; Coelho, Diego Rodrigues; Andrade, Iamara da Silva; de Medeiros, Luciano Neves; Menezes, Joice Lima; Barbosa, Angela Silva; Mohana-Borges, Ronaldo
2016-11-01
Dengue virus (DENV) infects millions of people worldwide and is a major public health problem. DENV nonstructural protein 1 (NS1) is a conserved glycoprotein that associates with membranes and is also secreted into the plasma in DENV-infected patients. The present study describes a novel mechanism by which NS1 inhibits the terminal complement pathway. We first identified the terminal complement regulator vitronectin (VN) as a novel DENV2 NS1 binding partner by using a yeast two-hybrid system. This interaction was further assessed by enzyme-linked immunosorbent assay (ELISA) and surface plasmon resonance (SPR) assay. The NS1-VN complex was also detected in plasmas from DENV-infected patients, suggesting that this interaction occurs during DENV infection. We also demonstrated that the DENV2 NS1 protein, either by itself or by interacting with VN, hinders the formation of the membrane attack complex (MAC) and C9 polymerization. Finally, we showed that DENV2, West Nile virus (WNV), and Zika virus (ZIKV) NS1 proteins produced in mammalian cells inhibited C9 polymerization. Taken together, our results points to a role for NS1 as a terminal pathway inhibitor of the complement system. Dengue is the most important arthropod-borne viral disease nowadays and is caused by dengue virus (DENV). The flavivirus NS1 glycoprotein has been characterized functionally as a complement evasion protein that can attenuate the activation of the classical, lectin, and alternative pathways. The present study describes a novel mechanism by which DENV NS1 inhibits the terminal complement pathway. We identified the terminal complement regulator vitronectin (VN) as a novel DENV NS1 binding partner, and the NS1-VN complex was detected in plasmas from DENV-infected patients, suggesting that this interaction occurs during DENV infection. We also demonstrated that the NS1-VN complex inhibited membrane attack complex (MAC) formation, thus interfering with the complement terminal pathway. Interestingly, NS1 itself also inhibited MAC activity, suggesting a direct role of this protein in the inhibition process. Our findings imply a role for NS1 as a terminal pathway inhibitor of the complement system. Copyright © 2016, American Society for Microbiology. All Rights Reserved.
Establishment of Chronic Infection: Brucella's Stealth Strategy
Ahmed, Waqas; Zheng, Ke; Liu, Zheng-Fei
2016-01-01
Brucella is a facultative intracellular pathogen that causes zoonotic infection known as brucellosis which results in abortion and infertility in natural host. Humans, especially in low income countries, can acquire infection by direct contact with infected animal or by consumption of animal products and show high morbidity, severe economic losses and public health problems. However for survival, host cells develop complex immune mechanisms to defeat and battle against attacking pathogens and maintain a balance between host resistance and Brucella virulence. On the other hand as a successful intracellular pathogen, Brucella has evolved multiple strategies to evade immune response mechanisms to establish persistent infection and replication within host. In this review, we mainly summarize the “Stealth” strategies employed by Brucella to modulate innate and the adaptive immune systems, autophagy, apoptosis and possible role of small noncoding RNA in the establishment of chronic infection. The purpose of this review is to give an overview for recent understanding how this pathogen evades immune response mechanisms of host, which will facilitate to understanding the pathogenesis of brucellosis and the development of novel, more effective therapeutic approaches to treat brucellosis. PMID:27014640
Interference of Aspergillus fumigatus with the immune response.
Heinekamp, Thorsten; Schmidt, Hella; Lapp, Katrin; Pähtz, Vera; Shopova, Iordana; Köster-Eiserfunke, Nora; Krüger, Thomas; Kniemeyer, Olaf; Brakhage, Axel A
2015-03-01
Aspergillus fumigatus is a saprotrophic filamentous fungus and also the most prevalent airborne fungal pathogen of humans. Depending on the host's immune status, the variety of diseases caused by A. fumigatus ranges from allergies in immunocompetent hosts to life-threatening invasive infections in patients with impaired immunity. In contrast to the majority of other Aspergillus species, which are in most cases nonpathogenic, A. fumigatus features an armory of virulence determinants to establish an infection. For example, A. fumigatus is able to evade the human complement system by binding or degrading complement regulators. Furthermore, the fungus interferes with lung epithelial cells, alveolar macrophages, and neutrophil granulocytes to prevent killing by these immune cells. This chapter summarizes the different strategies of A. fumigatus to manipulate the immune response. We also discuss the potential impact of recent advances in immunoproteomics to improve diagnosis and therapy of an A. fumigatus infection.
Tavano, Regina; Gabrielli, Luca; Lubian, Elisa; Fedeli, Chiara; Visentin, Silvia; Polverino De Laureto, Patrizia; Arrigoni, Giorgio; Geffner-Smith, Alessandra; Chen, Fangfang; Simberg, Dmitri; Morgese, Giulia; Benetti, Edmondo M; Wu, Linping; Moghimi, Seyed Moein; Mancin, Fabrizio; Papini, Emanuele
2018-05-23
Poly(2-methyl-2-oxazoline) (PMOXA) is an alternative promising polymer to poly(ethylene glycol) (PEG) for design and engineering of macrophage-evading nanoparticles (NPs). Although PMOXA-engineered NPs have shown comparable pharmacokinetics and in vivo performance to PEGylated stealth NPs in the murine model, its interaction with elements of the human innate immune system has not been studied. From a translational angle, we studied the interaction of fully characterized PMOXA-coated vinyltriethoxysilane-derived organically modified silica NPs (PMOXA-coated NPs) of approximately 100 nm in diameter with human complement system, blood leukocytes, and macrophages and compared their performance with PEGylated and uncoated NP counterparts. Through detailed immunological and proteomic profiling, we show that PMOXA-coated NPs extensively trigger complement activation in human sera exclusively through the classical pathway. Complement activation is initiated by the sensing molecule C1q, where C1q binds with high affinity ( K d = 11 ± 1 nM) to NP surfaces independent of immunoglobulin binding. C1q-mediated complement activation accelerates PMOXA opsonization with the third complement protein (C3) through the amplification loop of the alternative pathway. This promoted NP recognition by human blood leukocytes and monocyte-derived macrophages. The macrophage capture of PMOXA-coated NPs correlates with sera donor variability in complement activation and opsonization but not with other major corona proteins, including clusterin and a wide range of apolipoproteins. In contrast to these observations, PMOXA-coated NPs poorly activated the murine complement system and were marginally recognized by mouse macrophages. These studies provide important insights into compatibility of engineered NPs with elements of the human innate immune system for translational steps.
T-Cell Warriors—Equipped to Kill Cancer Cells | Center for Cancer Research
When the body recognizes tumor cells as foreign, a natural immune response arises to attack them. Unfortunately, tumors have ways to evade immune surveillance systems and antitumor responses are often too weak to defeat the disease. Rather than relying on the body’s natural response, scientists can now manipulate a patient’s own immune cells so that they latch on to tumor cells by recognizing specific proteins on their surface. A type of immune cell that has been explored for this purpose is the killer (cytotoxic) T cell, which eliminates cells infected by viruses, damaged cells, and tumor cells.
Fernie-King, Barbara A; Seilly, David J; Willers, Christine; Würzner, Reinhard; Davies, Alexandra; Lachmann, Peter J
2001-01-01
Streptococcal inhibitor of complement (SIC) was first described in 1996 as a putative inhibitor of the membrane attack complex of complement (MAC). SIC is a 31 000 MW protein secreted in large quantities by the virulent Streptococcus pyogenes strains M1 and M57, and is encoded by a gene which is extremely variable. In order to study further the interactions of SIC with the MAC, we have made a recombinant form of SIC (rSIC) in Escherichia coli and purified native M1 SIC which was used to raise a polyclonal antibody. SIC prevented reactive lysis of guinea pig erythrocytes by the MAC at a stage prior to C5b67 complexes binding to cell membranes, presumably by blocking the transiently expressed membrane insertion site on C7. The ability of SIC and clusterin (another putative fluid phase complement inhibitor) to inhibit complement lysis was compared, and found to be equally efficient. In parallel, by enzyme-linked immunosorbent assay both SIC and rSIC bound strongly to C5b67 and C5b678 complexes and to a lesser extent C5b-9, but only weakly to individual complement components. The implications of these data for virulence of SIC-positive streptococci are discussed, in light of the fact that Gram-positive organisms are already protected against complement lysis by the presence of their peptidoglycan cell walls. We speculate that MAC inhibition may not be the sole function of SIC. PMID:11454069
Honda-Ogawa, Mariko; Sumitomo, Tomoko; Mori, Yasushi; Hamd, Dalia Talat; Ogawa, Taiji; Yamaguchi, Masaya; Nakata, Masanobu; Kawabata, Shigetada
2017-03-10
Streptococcus pyogenes secretes various virulence factors for evasion from complement-mediated bacteriolysis. However, full understanding of the molecules possessed by this organism that interact with complement C1q, an initiator of the classical complement pathway, remains elusive. In this study, we identified an endopeptidase of S. pyogenes , PepO, as an interacting molecule, and investigated its effects on complement immunity and pathogenesis. Enzyme-linked immunosorbent assay and surface plasmon resonance analysis findings revealed that S. pyogenes recombinant PepO bound to human C1q in a concentration-dependent manner under physiological conditions. Sites of inflammation are known to have decreased pH levels, thus the effects of PepO on bacterial evasion from complement immunity was analyzed in a low pH condition. Notably, under low pH conditions, PepO exhibited a higher affinity for C1q as compared with IgG, and PepO inhibited the binding of IgG to C1q. In addition, pepO deletion rendered S. pyogenes more susceptible to the bacteriocidal activity of human serum. Also, observations of the morphological features of the pepO mutant strain (Δ pepO ) showed damaged irregular surfaces as compared with the wild-type strain (WT). WT-infected tissues exhibited greater severity and lower complement activity as compared with those infected by Δ pepO in a mouse skin infection model. Furthermore, WT infection resulted in a larger accumulation of C1q than that with Δ pepO. Our results suggest that interaction of S. pyogenes PepO with C1q interferes with the complement pathway, which enables S. pyogenes to evade complement-mediated bacteriolysis under acidic conditions, such as seen in inflammatory sites. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.
A novel factor H-Fc chimeric immunotherapeutic molecule against Neisseria gonorrhoeae
Shaughnessy, Jutamas; Gulati, Sunita; Agarwal, Sarika; Unemo, Magnus; Ohnishi, Makoto; Su, Xia-Hong; Monks, Brian G.; Visintin, Alberto; Madico, Guillermo; Lewis, Lisa A.; Golenbock, Douglas T.; Reed, George W.; Rice, Peter A.; Ram, Sanjay
2015-01-01
Neisseria gonorrhoeae (Ng), the causative agent of the sexually transmitted infection gonorrhea, has developed resistance to almost every conventional antibiotic. There is an urgent need to develop novel therapies against gonorrhea. Many pathogens, including Ng, bind the complement inhibitor factor H (FH) to evade complement-dependent killing. Sialylation of gonococcal lipooligosaccharide, as occurs in vivo, augments binding of human FH through its domains 18-20 (FH18-20). We explored the utility of fusing FH18-20 with IgG Fc (FH18-20/Fc) to create a novel anti-infective immunotherapeutic. FH18-20 also binds to select host glycosaminoglycans to limit unwanted complement activation on host cells. To identify mutation(s) in FH18-20 that eliminated complement activation on host cells, yet maintained binding to Ng, we created four mutations in domains 19 or 20 described in atypical hemolytic uremic syndrome that prevented binding of mutated fH to human erythrocytes. One of the mutant proteins (D to G at position 1119 in domain 19; FHD1119G/Fc) facilitated complement-dependent killing of gonococci similar to unmodified FH18-20/Fc, but unlike FH18-20/Fc, did not lyse human erythrocytes. FHD1119G/Fc bound to all (100%) of 15 sialylated clinical Ng isolates tested (including three contemporary ceftriaxone-resistant strains), mediated complement-dependent killing of 10/15 (67%) strains and enhanced C3 deposition (≥10-fold above baseline levels) on each of the five isolates not directly killed by complement. FHD1119G/Fc facilitated opsonophagocytic killing of a serum-resistant strain by human polymorphonuclear neutrophils. FHD1119G/Fc administered intravaginally significantly reduced the duration and burden of gonococcal infection in the mouse vaginal colonization model. FHD1119G/Fc represents a novel immunotherapeutic against multidrug-resistant Ng. PMID:26773149
Awasthi, Sita; Hook, Lauren M; Shaw, Carolyn E; Friedman, Harvey M
2017-12-02
An estimated 417 million people worldwide ages 15 to 49 are infected with herpes simplex virus type 2 (HSV-2), the most common cause of genital ulcer disease. Some individuals experience frequent recurrences of genital lesions, while others only have subclinical infection, yet all risk transmitting infection to their intimate partners. A vaccine was developed that prevents shingles, which is a recurrent infection caused by varicella-zoster virus (VZV), a closely related member of the Herpesviridae family. The success of the VZV vaccine has stimulated renewed interest in a therapeutic vaccine for genital herpes. We have been evaluating a trivalent subunit antigen vaccine for prevention of genital herpes. Here, we assess the trivalent vaccine as immunotherapy in guinea pigs that were previously infected intravaginally with HSV-2. The trivalent vaccine contains HSV-2 glycoproteins C, D, and E (gC2, gD2, gE2) subunit antigens administered with CpG and alum as adjuvants. We previously demonstrated that antibodies to gD2 neutralize the virus while antibodies to gC2 and gE2 block their immune evasion activities, including evading complement attack and inhibiting activities mediated by the IgG Fc domain, respectively. Here, we demonstrate that the trivalent vaccine significantly boosts ELISA titers and neutralizing antibody titers. The trivalent vaccine reduces the frequency of recurrent genital lesions and vaginal shedding of HSV-2 DNA by approximately 50% and almost totally eliminates vaginal shedding of replication-competent virus, suggesting that the trivalent vaccine is a worthy candidate for immunotherapy of genital herpes.
Zhao, Xin; Chen, Yun-Xia; Li, Chun-Sheng
2015-01-01
To investigate the prognostic performance of complement components in septic patients, complement 3, membrane attack complex (MAC) and mannose-binding lectin were measured and compared among adult patients with sepsis, severe sepsis and septic shock, as well as between in-hospital nonsurvivors and survivors. The prognostic value of complement components was compared with mortality in emergency department sepsis (MEDS) score. Median complement 3, MAC and mannose-binding lectin increased directly with the sepsis, severe sepsis and septic shock groups, and were significantly higher in nonsurvivors than in survivors. MEDS and MAC independently predicted in-hospital mortality. The prognostic performance of MAC was superior to MEDS as analyzed by receiver operating characteristic curve and area under the curve.
Human Cytomegalovirus UL18 Utilizes US6 for Evading the NK and T-Cell Responses
Kim, Youngkyun; Park, Boyoun; Cho, Sunglim; Shin, Jinwook; Cho, Kwangmin; Jun, Youngsoo; Ahn, Kwangseog
2008-01-01
Human cytomegalovirus (HCMV) US6 glycoprotein inhibits TAP function, resulting in down-regulation of MHC class I molecules at the cell surface. Cells lacking MHC class I molecules are susceptible to NK cell lysis. HCMV expresses UL18, a MHC class I homolog that functions as a surrogate to prevent host cell lysis. Despite a high level of sequence and structural homology between UL18 and MHC class I molecules, surface expression of MHC class I, but not UL18, is down regulated by US6. Here, we describe a mechanism of action by which HCMV UL18 avoids attack by the self-derived TAP inhibitor US6. UL18 abrogates US6 inhibition of ATP binding by TAP and, thereby, restores TAP-mediated peptide translocation. In addition, UL18 together with US6 interferes with the physical association between MHC class I molecules and TAP that is required for optimal peptide loading. Thus, regardless of the recovery of TAP function, surface expression of MHC class I molecules remains decreased. UL18 represents a unique immune evasion protein that has evolved to evade both the NK and the T cell immune responses. PMID:18688275
Targeted Therapy: Attacking Cancer with Molecular and Immunological Targeted Agents.
Wilkes, Gail M
2018-01-01
Today, personalized cancer therapy with targeted agents has taken center stage, and offers individualized treatment to many. As the mysteries of the genes in a cell's DNA and their specific proteins are defined, advances in the understanding of cancer gene mutations and how cancer evades the immune system have been made. This article provides a basic and simplified understanding of the available (Food and Drug Administration- approved) molecularly and immunologically targeted agents in the USA. Other agents may be available in Asia, and throughout the USA and the world, many more agents are being studied. Nursing implications for drug classes are reviewed.
Targeted Therapy: Attacking Cancer with Molecular and Immunological Targeted Agents
Wilkes, Gail M.
2018-01-01
Today, personalized cancer therapy with targeted agents has taken center stage, and offers individualized treatment to many. As the mysteries of the genes in a cell's DNA and their specific proteins are defined, advances in the understanding of cancer gene mutations and how cancer evades the immune system have been made. This article provides a basic and simplified understanding of the available (Food and Drug Administration- approved) molecularly and immunologically targeted agents in the USA. Other agents may be available in Asia, and throughout the USA and the world, many more agents are being studied. Nursing implications for drug classes are reviewed. PMID:29607374
Billecocq, A
1987-09-01
Schistosoma mansoni schistosomula cultured in the presence of phospholipids showed a decreased sensitivity to the lethal complement-mediated action of anti-schistosome antibodies. Phosphatidyl choline, sphingomyelin and phosphatidyl ethanolamine had a protective action on the schistosomula transformed in vitro by passage through the skin or by a mechanical procedure. Phosphatidyl choline acted regardless of its fatty acid composition. Phosphatidyl serine and phosphatidic acid did not protect. Thus, it appears that phospholipids can play a role in parasite resistance to immune attack by cytotoxic antibodies and complement, and that this role is specific to certain phospholipid types.
Awasthi, Sita; Hook, Lauren M.; Shaw, Carolyn E.; Friedman, Harvey M.
2017-01-01
ABSTRACT An estimated 417 million people worldwide ages 15 to 49 are infected with herpes simplex virus type 2 (HSV-2), the most common cause of genital ulcer disease. Some individuals experience frequent recurrences of genital lesions, while others only have subclinical infection, yet all risk transmitting infection to their intimate partners. A vaccine was developed that prevents shingles, which is a recurrent infection caused by varicella-zoster virus (VZV), a closely related member of the Herpesviridae family. The success of the VZV vaccine has stimulated renewed interest in a therapeutic vaccine for genital herpes. We have been evaluating a trivalent subunit antigen vaccine for prevention of genital herpes. Here, we assess the trivalent vaccine as immunotherapy in guinea pigs that were previously infected intravaginally with HSV-2. The trivalent vaccine contains HSV-2 glycoproteins C, D, and E (gC2, gD2, gE2) subunit antigens administered with CpG and alum as adjuvants. We previously demonstrated that antibodies to gD2 neutralize the virus while antibodies to gC2 and gE2 block their immune evasion activities, including evading complement attack and inhibiting activities mediated by the IgG Fc domain, respectively. Here, we demonstrate that the trivalent vaccine significantly boosts ELISA titers and neutralizing antibody titers. The trivalent vaccine reduces the frequency of recurrent genital lesions and vaginal shedding of HSV-2 DNA by approximately 50% and almost totally eliminates vaginal shedding of replication-competent virus, suggesting that the trivalent vaccine is a worthy candidate for immunotherapy of genital herpes. PMID:28481687
Hovingh, Elise S.; de Maat, Steven; Cloherty, Alexandra P. M.; Johnson, Steven; Pinelli, Elena; Maas, Coen; Jongerius, Ilse
2018-01-01
Bordetella pertussis is a Gram-negative bacterium and the causative agent of whooping cough. Whooping cough is currently re-emerging worldwide and, therefore, still poses a continuous global health threat. B. pertussis expresses several virulence factors that play a role in evading the human immune response. One of these virulence factors is virulence associated gene 8 (Vag8). Vag8 is a complement evasion molecule that mediates its effects by binding to the complement regulator C1 inhibitor (C1-INH). This regulatory protein is a fluid phase serine protease that controls proenzyme activation and enzyme activity of not only the complement system but also the contact system. Activation of the contact system results in the generation of bradykinin, a pro-inflammatory peptide. Here, the activation of the contact system by B. pertussis was explored. We demonstrate that recombinant as well as endogenous Vag8 enhanced contact system activity by binding C1-INH and attenuating its inhibitory function. Moreover, we show that B. pertussis itself is able to activate the contact system. This activation was dependent on Vag8 production as a Vag8 knockout B. pertussis strain was unable to activate the contact system. These findings show a previously overlooked interaction between the contact system and the respiratory pathogen B. pertussis. Activation of the contact system by B. pertussis may contribute to its pathogenicity and virulence. PMID:29915576
Hovingh, Elise S; de Maat, Steven; Cloherty, Alexandra P M; Johnson, Steven; Pinelli, Elena; Maas, Coen; Jongerius, Ilse
2018-01-01
Bordetella pertussis is a Gram-negative bacterium and the causative agent of whooping cough. Whooping cough is currently re-emerging worldwide and, therefore, still poses a continuous global health threat. B. pertussis expresses several virulence factors that play a role in evading the human immune response. One of these virulence factors is virulence associated gene 8 (Vag8). Vag8 is a complement evasion molecule that mediates its effects by binding to the complement regulator C1 inhibitor (C1-INH). This regulatory protein is a fluid phase serine protease that controls proenzyme activation and enzyme activity of not only the complement system but also the contact system. Activation of the contact system results in the generation of bradykinin, a pro-inflammatory peptide. Here, the activation of the contact system by B. pertussis was explored. We demonstrate that recombinant as well as endogenous Vag8 enhanced contact system activity by binding C1-INH and attenuating its inhibitory function. Moreover, we show that B. pertussis itself is able to activate the contact system. This activation was dependent on Vag8 production as a Vag8 knockout B. pertussis strain was unable to activate the contact system. These findings show a previously overlooked interaction between the contact system and the respiratory pathogen B. pertussis . Activation of the contact system by B. pertussis may contribute to its pathogenicity and virulence.
Novel Scabies Mite Serpins Inhibit the Three Pathways of the Human Complement System
Mika, Angela; Reynolds, Simone L.; Mohlin, Frida C.; Willis, Charlene; Swe, Pearl M.; Pickering, Darren A.; Halilovic, Vanja; Wijeyewickrema, Lakshmi C.; Pike, Robert N.; Blom, Anna M.; Kemp, David J.; Fischer, Katja
2012-01-01
Scabies is a parasitic infestation of the skin by the mite Sarcoptes scabiei that causes significant morbidity worldwide, in particular within socially disadvantaged populations. In order to identify mechanisms that enable the scabies mite to evade human immune defenses, we have studied molecules associated with proteolytic systems in the mite, including two novel scabies mite serine protease inhibitors (SMSs) of the serpin superfamily. Immunohistochemical studies revealed that within mite-infected human skin SMSB4 (54 kDa) and SMSB3 (47 kDa) were both localized in the mite gut and feces. Recombinant purified SMSB3 and SMSB4 did not inhibit mite serine and cysteine proteases, but did inhibit mammalian serine proteases, such as chymotrypsin, albeit inefficiently. Detailed functional analysis revealed that both serpins interfered with all three pathways of the human complement system at different stages of their activation. SMSB4 inhibited mostly the initial and progressing steps of the cascades, while SMSB3 showed the strongest effects at the C9 level in the terminal pathway. Additive effects of both serpins were shown at the C9 level in the lectin pathway. Both SMSs were able to interfere with complement factors without protease function. A range of binding assays showed direct binding between SMSB4 and seven complement proteins (C1, properdin, MBL, C4, C3, C6 and C8), while significant binding of SMSB3 occurred exclusively to complement factors without protease function (C4, C3, C8). Direct binding was observed between SMSB4 and the complement proteases C1s and C1r. However no complex formation was observed between either mite serpin and the complement serine proteases C1r, C1s, MASP-1, MASP-2 and MASP-3. No catalytic inhibition by either serpin was observed for any of these enzymes. In summary, the SMSs were acting at several levels mediating overall inhibition of the complement system and thus we propose that they may protect scabies mites from complement-mediated gut damage. PMID:22792350
Schönermark, S; Filsinger, S; Berger, B; Hänsch, G M
1988-01-01
C8-binding protein is an intrinsic membrane protein of the human erythrocyte. It inhibits the complement (C5b-9)-mediated lysis in a species-restricting manner. In the present study we incorporated C8bp, isolated from human erythrocytes, into sheep erythrocytes (SRBC). SRBC, normally sensitive to lysis by human C5b-9, became insensitive to lysis. Furthermore, we found that C8bp is incorporated into the membrane-attack complex C5b-9, most probably by interacting with C8, since C8bp has an affinity for C8, particularly for the C8 alpha-gamma-subunit. Antibodies to C8bp react with the C8 alpha-subunits and with C9, pointing to the possibility of a partial homology between these proteins. Images Figure 4 Figure 6 Figure 7 PMID:3366469
Targeting the Human Complement Membrane Attack Complex to Selectively Kill Prostate Cancer Cells
2013-10-01
prostate cancer cells in vitro . Evaluate CD59 expression in human prostate cancer microarrays. Aim 4: Evaluate toxicity and efficacy of the lead PAC5...fragment in vitro . Since PSA is the major chymotrypsin-like serine protease in the seminal plasma and prostatic fluid, we hypothesized that PSA was...that the evolution -related complement protein C5, but not C4, is a substrate of PSA as well. *Department of Pharmacology and Molecular Sciences, The
Awasthi, Sita; Huang, Jialing; Shaw, Carolyn; Friedman, Harvey M
2014-08-01
Herpes simplex virus 2 (HSV-2) subunit antigen vaccines targeting virus entry molecules have failed to prevent genital herpes in human trials. Our approach is to include a virus entry molecule and add antigens that block HSV-2 immune evasion. HSV-2 glycoprotein C (gC2) is an immune evasion molecule that inhibits complement. We previously reported that adding gC2 to gD2 improved vaccine efficacy compared to the efficacy of either antigen alone in mice and guinea pigs. Here we demonstrate that HSV-2 glycoprotein E (gE2) functions as an immune evasion molecule by binding the IgG Fc domain. HSV-2 gE2 is synergistic with gC2 in protecting the virus from antibody and complement neutralization. Antibodies produced by immunization with gE2 blocked gE2-mediated IgG Fc binding and cell-to-cell spread. Mice immunized with gE2 were only partially protected against HSV-2 vaginal challenge in mice; however, when gE2 was added to gC2/gD2 to form a trivalent vaccine, neutralizing antibody titers with and without complement were significantly higher than those produced by gD2 alone. Importantly, the trivalent vaccine protected the dorsal root ganglia (DRG) of 32/33 (97%) mice between days 2 and 7 postchallenge, compared with 27/33 (82%) in the gD2 group. The HSV-2 DNA copy number was significantly lower in mice immunized with the trivalent vaccine than in those immunized with gD2 alone. The extent of DRG protection using the trivalent vaccine was better than what we previously reported for gC2/gD2 immunization. Therefore, gE2 is a candidate antigen for inclusion in a multivalent subunit vaccine that attempts to block HSV-2 immune evasion. Herpes simplex virus is the most common cause of genital ulcer disease worldwide. Infection results in emotional distress for infected individuals and their partners, is life threatening for infants exposed to herpes during childbirth, and greatly increases the risk of individuals acquiring and transmitting HIV infection. A vaccine that prevents genital herpes infection will have major public health benefits. Our vaccine approach includes strategies to prevent the virus from evading immune attack. Mice were immunized with a trivalent vaccine containing an antigen that induces antibodies to block virus entry and two antigens that induce antibodies that block immune evasion from antibody and complement. Immunized mice demonstrated no genital disease, and 32/33 (97%) animals had no evidence of infection of dorsal root ganglia, suggesting that the vaccine may prevent the establishment of latency and recurrent infections. Copyright © 2014, American Society for Microbiology. All Rights Reserved.
Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.
2012-01-01
Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660
Yang, Xiuli; Coleman, Adam S; Anguita, Juan; Pal, Utpal
2009-03-01
Borrelia burgdorferi, the bacterial pathogen of Lyme borreliosis, differentially expresses select genes in vivo, likely contributing to microbial persistence and disease. Expression analysis of spirochete genes encoding potential membrane proteins showed that surface-located membrane protein 1 (lmp1) transcripts were expressed at high levels in the infected murine heart, especially during early stages of infection. Mice and humans with diagnosed Lyme borreliosis also developed antibodies against Lmp1. Deletion of lmp1 severely impaired the pathogen's ability to persist in diverse murine tissues including the heart, and to induce disease, which was restored upon chromosomal complementation of the mutant with the lmp1 gene. Lmp1 performs an immune-related rather than a metabolic function, as its deletion did not affect microbial persistence in immunodeficient mice, but significantly decreased spirochete resistance to the borreliacidal effects of anti-B. burgdorferi sera in a complement-independent manner. These data demonstrate the existence of a virulence factor that helps the pathogen evade host-acquired immune defense and establish persistent infection in mammals.
Anti-GM2 gangliosides IgM paraprotein induces neuromuscular block without neuromuscular damage.
Santafé, Manel M; Sabaté, M Mar; Garcia, Neus; Ortiz, Nico; Lanuza, M Angel; Tomàs, Josep
2008-11-15
We analyzed the effect on the mouse neuromuscular synapses of a human monoclonal IgM, which binds specifically to gangliosides with the common epitope [GalNAc beta 1-4Gal(3-2 alpha NeuAc)beta 1-]. We focused on the role of the complement. Evoked neurotransmission was partially blocked by IgM both acutely (1 h) and chronically (10 days). Transmission electron microscopy shows important nerve terminal growth and retraction remodelling though axonal injury can be ruled out. Synapses did not show mouse C5b-9 immunofluorescence and were only immunolabelled when human complement was added. Therefore, the IgM-induced synaptic changes occur without complement-mediated membrane attack.
NASA Technical Reports Server (NTRS)
Kelley, H. J.; Cliff, E. M.; Lutze, F. H.
1981-01-01
Maneuvers available to a spacecraft having sufficient propellant to escape an antisatellite satellite (ASAT) attack are examined. The ASAT and the evading spacecraft are regarded as being in circular orbits, and equations of motion are developed for the ASAT to commence a two-impulse maneuver sequence. The ASAT employs thrust impulses which yield a minimum-time-to-rendezvous, considering available fuel. Optimal evasion is shown to involve only in-plane maneuvers, and begins as soon as the ASAT launch information is gathered and thrust activation can be initiated. A closest approach, along with a maximum evasion by the target spacecraft, is calculated to be 14,400 ft. Further research to account for ASATs in parking orbit and for generalization of a continuous control-modeled differential game is indicated.
Chimeras of human complement C9 reveal the site recognized by complement regulatory protein CD59.
Hüsler, T; Lockert, D H; Kaufman, K M; Sodetz, J M; Sims, P J
1995-02-24
CD59 antigen is a membrane glycoprotein that inhibits the activity of the C9 component of the C5b-9 membrane attack complex, thereby protecting human cells from lysis by human complement. The complement-inhibitory activity of CD59 is species-selective and is most effective toward C9 derived from human or other primate plasma. By contrast, rabbit C9, which can substitute for human C9 in the membrane attack complex, mediates unrestricted lysis of human cells. To identify the peptide segment of human C9 that is recognized by CD59, rabbit C9 cDNA clones were isolated, characterized, and used to construct hybrid cDNAs for expression of full-length human/rabbit C9 chimeras in COS-7 cells. All resulting chimeras were hemolytically active, when tested against chicken erythrocytes bearing C5b-8 complexes. Assays performed in the presence or absence of CD59 revealed that this inhibitor reduced the hemolytic activity of those chimeras containing human C9 sequence between residues 334-415, irrespective of whether the remainder of the protein contained human or rabbit sequence. By contrast, when this segment of C9 contained rabbit sequence, lytic activity was unaffected by CD59. These data establish that human C9 residues 334-415 contain the site recognized by CD59, and they suggest that sequence variability within this segment of C9 is responsible for the observed species-selective inhibitory activity of CD59.
Complement Membrane Attack and Tumorigenesis: A SYSTEMS BIOLOGY APPROACH.
Towner, Laurence D; Wheat, Richard A; Hughes, Timothy R; Morgan, B Paul
2016-07-15
Tumor development driven by inflammation is now an established phenomenon, but the role that complement plays remains uncertain. Recent evidence has suggested that various components of the complement (C) cascade may influence tumor development in disparate ways; however, little attention has been paid to that of the membrane attack complex (MAC). This is despite abundant evidence documenting the effects of this complex on cell behavior, including cell activation, protection from/induction of apoptosis, release of inflammatory cytokines, growth factors, and ECM components and regulators, and the triggering of the NLRP3 inflammasome. Here we present a novel approach to this issue by using global gene expression studies in conjunction with a systems biology analysis. Using network analysis of MAC-responsive expression changes, we demonstrate a cluster of co-regulated genes known to have impact in the extracellular space and on the supporting stroma and with well characterized tumor-promoting roles. Network analysis highlighted the central role for EGF receptor activation in mediating the observed responses to MAC exposure. Overall, the study sheds light on the mechanisms by which sublytic MAC causes tumor cell responses and exposes a gene expression signature that implicates MAC as a driver of tumor progression. These findings have implications for understanding of the roles of complement and the MAC in tumor development and progression, which in turn will inform future therapeutic strategies in cancer. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.
Hiding in plain sight: immune evasion by the staphylococcal protein SdrE.
Herr, Andrew B; Thorman, Alexander W
2017-05-10
The human immune system is responsible for identification and destruction of invader cells, such as the bacterial pathogen Staphylococcus aureus In response, S. aureus brings to the fight a large number of virulence factors, including several that allow it to evade the host immune response. The staphylococcal surface protein SdrE was recently reported to bind to complement Factor H, an important regulator of complement activation. Factor H attaches to the surface of host cells to inhibit complement activation and amplification, preventing the destruction of the host cell. SdrE binding to Factor H allows S. aureus to mimic a host cell and reduces bacterial killing by granulocytes. In a new study published in Biochemical Journal , Zhang et al. describe crystal structures of SdrE and its complex with the C-terminal portion of Factor H. The structure of SdrE and its interaction with the Factor H peptide closely resemble a family of surface proteins that recognize extracellular matrix components such as fibrinogen. However, unbound SdrE forms a novel 'Closed' conformation with an occluded peptide-binding groove. These structures reveal a fascinating mechanism for immune evasion and provide a potential avenue for the development of novel antimicrobial agents to target SdrE. © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.
NASA Astrophysics Data System (ADS)
Mascarenas, David; Stull, Christopher; Farrar, Charles
2011-06-01
In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.
Implementation of digital image encryption algorithm using logistic function and DNA encoding
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria, Yudi; Fauzi, Muhammad
2018-03-01
Cryptography is a method to secure information that might be in form of digital image. Based on past research, in order to increase security level of chaos based encryption algorithm and DNA based encryption algorithm, encryption algorithm using logistic function and DNA encoding was proposed. Digital image encryption algorithm using logistic function and DNA encoding use DNA encoding to scramble the pixel values into DNA base and scramble it in DNA addition, DNA complement, and XOR operation. The logistic function in this algorithm used as random number generator needed in DNA complement and XOR operation. The result of the test show that the PSNR values of cipher images are 7.98-7.99 bits, the entropy values are close to 8, the histogram of cipher images are uniformly distributed and the correlation coefficient of cipher images are near 0. Thus, the cipher image can be decrypted perfectly and the encryption algorithm has good resistance to entropy attack and statistical attack.
McGonigal, Rhona; Cunningham, Madeleine E; Yao, Denggao; Barrie, Jennifer A; Sankaranarayanan, Sethu; Fewou, Simon N; Furukawa, Koichi; Yednock, Ted A; Willison, Hugh J
2016-03-02
Guillain-Barré syndrome (GBS) is an autoimmune disease that results in acute paralysis through inflammatory attack on peripheral nerves, and currently has limited, non-specific treatment options. The pathogenesis of the acute motor axonal neuropathy (AMAN) variant is mediated by complement-fixing anti-ganglioside antibodies that directly bind and injure the axon at sites of vulnerability such as nodes of Ranvier and nerve terminals. Consequently, the complement cascade is an attractive target to reduce disease severity. Recently, C5 complement component inhibitors that block the formation of the membrane attack complex and subsequent downstream injury have been shown to be efficacious in an in vivo anti-GQ1b antibody-mediated mouse model of the GBS variant Miller Fisher syndrome (MFS). However, since gangliosides are widely expressed in neurons and glial cells, injury in this model was not targeted exclusively to the axon and there are currently no pure mouse models for AMAN. Additionally, C5 inhibition does not prevent the production of early complement fragments such as C3a and C3b that can be deleterious via their known role in immune cell and macrophage recruitment to sites of neuronal damage. In this study, we first developed a new in vivo transgenic mouse model of AMAN using mice that express complex gangliosides exclusively in neurons, thereby enabling specific targeting of axons with anti-ganglioside antibodies. Secondly, we have evaluated the efficacy of a novel anti-C1q antibody (M1) that blocks initiation of the classical complement cascade, in both the newly developed anti-GM1 antibody-mediated AMAN model and our established MFS model in vivo. Anti-C1q monoclonal antibody treatment attenuated complement cascade activation and deposition, reduced immune cell recruitment and axonal injury, in both mouse models of GBS, along with improvement in respiratory function. These results demonstrate that neutralising C1q function attenuates injury with a consequent neuroprotective effect in acute GBS models and promises to be a useful new target for human therapy.
Li, Yujia; Parks, Griffith D.
2018-01-01
The complement system is a part of the innate immune system that viruses need to face during infections. Many viruses incorporate cellular regulators of complement activation (RCA) to block complement pathways and our prior work has shown that Parainfluenza virus 5 (PIV5) incorporates CD55 and CD46 to delay complement-mediated neutralization. In this paper, we tested the role of a third individual RCA inhibitor CD59 in PIV5 interactions with complement pathways. Using a cell line engineered to express CD59, we show that small levels of functional CD59 are associated with progeny PIV5, which is capable of blocking assembly of the C5b-C9 membrane attack complex (MAC). PIV5 containing CD59 (PIV5-CD59) showed increased resistance to complement-mediated neutralization in vitro comparing to PIV5 lacking regulators. Infection of A549 cells with PIV5 and RSV upregulated CD59 expression. TGF-beta treatment of PIV5-infected cells also increased cell surface CD59 expression and progeny virions were more resistant to complement-mediated neutralization. A comparison of individual viruses containing only CD55, CD46, or CD59 showed a potency of inhibiting complement-mediated neutralization, which followed a pattern of CD55 > CD46 > CD59. PMID:29693588
Shi, Kaibin; Wang, Zhen; Liu, Yuanchu; Gong, Ye; Fu, Ying; Li, Shaowu; Wood, Kristofer; Hao, Junwei; Zhang, Guang-Xian; Shi, Fu-Dong; Yan, Yaping
2016-11-01
A major hurdle for effective stem cell therapy is ongoing inflammation in the target organ. Reconditioning the lesion microenvironment may be an effective way to promote stem cell therapy. In this study, we showed that engineered neural stem cells (NSCs) with complement factor H-related protein 1, a complement inhibitor protein, can attenuate inflammatory infiltration and immune-mediated damage of astrocytes, an important pathogenic progress in patients with neuromyelitis optica spectrum disorders. Furthermore, we demonstrated that transplantation of the complement factor H-related protein 1-modified NSCs effectively blocked the complement activation cascade and inhibited formation of the membrane attack complex, thus contributing to the protection of endogenous and transplanted NSC-differentiated astrocytes. Therefore, manipulation of the lesion microenvironment contributes to a more effective cell replacement therapeutic strategy for autoimmune diseases of the CNS. Copyright © 2016 by The American Association of Immunologists, Inc.
Eculizumab for dense deposit disease and C3 glomerulonephritis.
Bomback, Andrew S; Smith, Richard J; Barile, Gaetano R; Zhang, Yuzhou; Heher, Eliot C; Herlitz, Leal; Stokes, M Barry; Markowitz, Glen S; D'Agati, Vivette D; Canetta, Pietro A; Radhakrishnan, Jai; Appel, Gerald B
2012-05-01
The principle defect in dense deposit disease and C3 glomerulonephritis is hyperactivity of the alternative complement pathway. Eculizumab, a monoclonal antibody that binds to C5 to prevent formation of the membrane attack complex, may prove beneficial. In this open-label, proof of concept efficacy and safety study, six subjects with dense deposit disease or C3 glomerulonephritis were treated with eculizumab every other week for 1 year. All had proteinuria >1 g/d and/or AKI at enrollment. Subjects underwent biopsy before enrollment and repeat biopsy at the 1-year mark. The subjects included three patients with dense deposit disease (including one patient with recurrent dense deposit disease in allograft) and three patients with C3 glomerulonephritis (including two patients with recurrent C3 glomerulonephritis in allograft). Genetic and complement function testing revealed a mutation in CFH and MCP in one subject each, C3 nephritic factor in three subjects, and elevated levels of serum membrane attack complex in three subjects. After 12 months, two subjects showed significantly reduced serum creatinine, one subject achieved marked reduction in proteinuria, and one subject had stable laboratory parameters but histopathologic improvements. Elevated serum membrane attack complex levels normalized on therapy and paralleled improvements in creatinine and proteinuria. Clinical and histopathologic data suggest a response to eculizumab in some but not all subjects with dense deposit disease and C3 glomerulonephritis. Elevation of serum membrane attack complex before treatment may predict response. Additional research is needed to define the subgroup of dense deposit disease/C3 glomerulonephritis patients in whom eculizumab therapy can be considered.
[Immune response of Hansen's disease. Review].
Rada, Elsa; Aranzazu, Nacarid; Convit, Jacinto
2009-12-01
Hansen's disease presents a wide spectrum of clinical and histopathological manifestations that reflect the nature of the immunological response of the host towards diverse Mycobacterium leprae components. The immunological system, composed by both innate and adaptive immunology, offers protection towards infections of various etiologies, among them bacterial. Bacteria, of course, have developed multiple strategies for evading host defenses, based on either very complex or simple mechanisms, but with a single purpose: to "resist" host attacks and to be able to survive. We have tried to summarize some recent studies in Hansen's disease, with more emphasis in the inmunology area. We think that in the future, all illnesses should also be very strongly related to other important aspects such as the social, environmental and economic, and whose development is not solved in a laboratory.
Complement System Part II: Role in Immunity
Merle, Nicolas S.; Noe, Remi; Halbwachs-Mecarelli, Lise; Fremeaux-Bacchi, Veronique; Roumenina, Lubka T.
2015-01-01
The complement system has been considered for a long time as a simple lytic cascade, aimed to kill bacteria infecting the host organism. Nowadays, this vision has changed and it is well accepted that complement is a complex innate immune surveillance system, playing a key role in host homeostasis, inflammation, and in the defense against pathogens. This review discusses recent advances in the understanding of the role of complement in physiology and pathology. It starts with a description of complement contribution to the normal physiology (homeostasis) of a healthy organism, including the silent clearance of apoptotic cells and maintenance of cell survival. In pathology, complement can be a friend or a foe. It acts as a friend in the defense against pathogens, by inducing opsonization and a direct killing by C5b–9 membrane attack complex and by triggering inflammatory responses with the anaphylatoxins C3a and C5a. Opsonization plays also a major role in the mounting of an adaptive immune response, involving antigen presenting cells, T-, and B-lymphocytes. Nevertheless, it can be also an enemy, when pathogens hijack complement regulators to protect themselves from the immune system. Inadequate complement activation becomes a disease cause, as in atypical hemolytic uremic syndrome, C3 glomerulopathies, and systemic lupus erythematosus. Age-related macular degeneration and cancer will be described as examples showing that complement contributes to a large variety of conditions, far exceeding the classical examples of diseases associated with complement deficiencies. Finally, we discuss complement as a therapeutic target. PMID:26074922
Mesophilic Aeromonas sp. serogroup O:11 resistance to complement-mediated killing.
Merino, S; Rubires, X; Aguilar, A; Albertí, S; Hernandez-Allés, S; Benedí, V J; Tomas, J M
1996-01-01
The complement activation by and resistance to complement-mediated killing of Aeromonas sp. strains from serogroup O:11 were investigated by using different wild-type strains (with an S-layer characteristic of this serogroup) and their isogenic mutants characterized for their surface components (S-layer and lipopolysaccharide [LPS]). All of the Aeromonas sp. serogroup O:11 wild-type strains are unable to activate complement, which suggested that the S-layer completely covered the LPS molecules. We found that the classical complement pathway is involved in serum killing of susceptible Aeromonas sp. mutant strains of serogroup O11, while the alternative complement pathway seems not to be involved, and that the complement activation seems to be independent of antibody. The smooth mutant strains devoid of the S-layer (S-layer isogenic mutants) or isogenic LPS mutant strains with a complete or rather complete LPS core (also without the S-layer) are able to activate complement but are resistant to complement-mediated killing. The reasons for this resistance are that C3b is rapidly degraded, and therefore the lytic membrane attack complex (C5b-9) is not formed. Isogenic LPS rough mutants with an incomplete LPS core are serum sensitive because they bind more C3b than the resistant strains, the C3b is not completely degraded, and therefore the lytic complex (C5b-9) is formed. PMID:8945581
Complement in autoimmune diseases.
Vignesh, Pandiarajan; Rawat, Amit; Sharma, Madhubala; Singh, Surjit
2017-02-01
The complement system is an ancient and evolutionary conserved element of the innate immune mechanism. It comprises of more than 20 serum proteins most of which are synthesized in the liver. These proteins are synthesized as inactive precursor proteins which are activated by appropriate stimuli. The activated forms of these proteins act as proteases and cleave other components successively in amplification pathways leading to exponential generation of final effectors. Three major pathways of complement pathways have been described, namely the classical, alternative and lectin pathways which are activated by different stimuli. However, all the 3 pathways converge on Complement C3. Cleavage of C3 and C5 successively leads to the production of the membrane attack complex which is final common effector. Excessive and uncontrolled activation of the complement has been implicated in the host of autoimmune diseases. But the complement has also been bemusedly described as the proverbial "double edged sword". On one hand, complement is the final effector of tissue injury in autoimmune diseases and on the other, deficiencies of some components of the complement can result in autoimmune diseases. Currently available tools such as enzyme based immunoassays for functional assessment of complement pathways, flow cytometry, next generation sequencing and proteomics-based approaches provide an exciting opportunity to study this ancient yet mysterious element of innate immunity. Copyright © 2017 Elsevier B.V. All rights reserved.
Myasthenia gravis: the role of complement at the neuromuscular junction.
Howard, James F
2018-01-01
Generalized myasthenia gravis (gMG) is a rare autoimmune disorder characterized by skeletal muscle weakness caused by disrupted neurotransmission at the neuromuscular junction (NMJ). Approximately 74-88% of patients with gMG have acetylcholine receptor (AChR) autoantibodies. Complement plays an important role in innate and antibody-mediated immunity, and activation and amplification of complement results in the formation of membrane attack complexes (MACs), lipophilic proteins that damage cell membranes. The role of complement in gMG has been demonstrated in animal models and patients. Studies in animals lacking specific complement proteins have confirmed that MAC formation is required to induce experimental autoimmune MG (EAMG) and NMJ damage. Complement inhibition in EAMG models can prevent disease induction and reverse its progression. Patients with anti-AChR + MG have autoantibodies and MACs present at NMJs. Damaged NMJs are associated with more severe disease, fewer AChRs, and MACs in synaptic debris. Current MG therapies do not target complement directly. Eculizumab is a humanized monoclonal antibody that inhibits cleavage of complement protein C5, preventing MAC formation. Eculizumab treatment improved symptoms compared with placebo in a phase II study in patients with refractory gMG. Direct complement inhibition could preserve NMJ physiology and muscle function in patients with anti-AChR + gMG. © 2017 The Authors. Annals of the New York Academy of Sciences published by Wiley Periodicals Inc. on behalf of The New York Academy of Sciences.
Rettig, Trisha A.; Harbin, Julie N.; Harrington, Adelaide; Dohmen, Leonie; Fleming, Sherry D.
2015-01-01
The humoral innate immune system is composed of three major branches, complement, coagulation, and natural antibodies. To persist in the host, pathogens, such as bacteria, viruses, and cancers must evade parts of the innate humoral immune system. Disruptions in the humoral innate immune system also play a role in the development of autoimmune diseases. This review will examine how gram positive bacteria, viruses, cancer, and the autoimmune conditions Systemic Lupus Erythematosus and Anti-phospholipid syndrome, interact with these immune system components. Through examining evasion techniques it becomes clear that interplay between these three systems exists. By exploring the interplay and the evasion/disruption of the humoral innate immune system, we can develop a better understanding of pathogenic infections, cancer, and autoimmune disease development. PMID:26145788
Ma, Zhe; Zhang, Hui; Zheng, Junxi; Li, Yue; Yi, Li; Fan, Hongjie; Lu, Chengping
2012-01-01
Streptococcus equi ssp. zooepidemicus (S. zooepidemicus, S.z) is one of the common pathogens that can cause septicemia, meningitis, and mammitis in domesticated species. M-like protein (SzP) is an important virulence factor of S. zooepidemicus and contributes to bacterial infection and antiphagocytosis. The interaction between SzP of S. zooepidemicus and porcine thioredoxin (TRX) was identified by the yeast two-hybrid and further confirmed by co-immunoprecipitation. SzP interacted with both reduced and the oxidized forms of TRX without inhibiting TRX activity. Membrane anchored SzP was able to recruit TRX to the surface, which would facilitate the antiphagocytosis of the bacteria. Further experiments revealed that TRX regulated the alternative complement pathway by inhibiting C3 convertase activity and associating with factor H (FH). TRX alone inhibited C3 cleavage and C3a production, and the inhibitory effect was additive when FH was also present. TRX inhibited C3 deposition on the bacterial surface when it was recruited by SzP. These new findings indicated that S. zooepidemicus used SzP to recruit TRX and regulated the alternative complement pathways to evade the host immune phagocytosis. PMID:22384152
Stone, Brandee L.; Brissette, Catherine A.
2017-01-01
The emerging pathogen, Borrelia miyamotoi, is a relapsing fever spirochete vectored by the same species of Ixodes ticks that carry the causative agents of Lyme disease in the US, Europe, and Asia. Symptoms caused by infection with B. miyamotoi are similar to a relapsing fever infection. However, B. miyamotoi has adapted to different vectors and reservoirs, which could result in unique physiology, including immune evasion mechanisms. Lyme Borrelia utilize a combination of Ixodes-produced inhibitors and native proteins [i.e., factor H-binding proteins (FHBPs)/complement regulator-acquiring surface proteins, p43, BBK32, BGA66, BGA71, CD59-like protein] to inhibit complement, while some relapsing fever spirochetes use C4b-binding protein and likely Ornithodoros-produced inhibitors. To evade the humoral response, Borrelia utilize antigenic variation of either outer surface proteins (Osps) and the Vmp-like sequences (Vls) system (Lyme borreliae) or variable membrane proteins (Vmps, relapsing fever borreliae). B. miyamotoi possesses putative FHBPs and antigenic variation of Vmps has been demonstrated. This review summarizes and compares the common mechanisms utilized by Lyme and relapsing fever spirochetes, as well as the current state of understanding immune evasion by B. miyamotoi. PMID:28154563
Stone, Brandee L; Brissette, Catherine A
2017-01-01
The emerging pathogen, Borrelia miyamotoi , is a relapsing fever spirochete vectored by the same species of Ixodes ticks that carry the causative agents of Lyme disease in the US, Europe, and Asia. Symptoms caused by infection with B. miyamotoi are similar to a relapsing fever infection. However, B. miyamotoi has adapted to different vectors and reservoirs, which could result in unique physiology, including immune evasion mechanisms. Lyme Borrelia utilize a combination of Ixodes -produced inhibitors and native proteins [i.e., factor H-binding proteins (FHBPs)/complement regulator-acquiring surface proteins, p43, BBK32, BGA66, BGA71, CD59-like protein] to inhibit complement, while some relapsing fever spirochetes use C4b-binding protein and likely Ornithodoros -produced inhibitors. To evade the humoral response, Borrelia utilize antigenic variation of either outer surface proteins (Osps) and the Vmp-like sequences (Vls) system (Lyme borreliae) or variable membrane proteins (Vmps, relapsing fever borreliae). B. miyamotoi possesses putative FHBPs and antigenic variation of Vmps has been demonstrated. This review summarizes and compares the common mechanisms utilized by Lyme and relapsing fever spirochetes, as well as the current state of understanding immune evasion by B. miyamotoi .
Garcia, Brandon L.; Ramyar, Kasra X.; Keightley, Andrew; Ruyken, Maartje; Syriga, Maria; Sfyroera, Georgia; Weber, Alexander B.; Zolkiewski, Michal; Ricklin, Daniel; Lambris, John D.; Rooijakkers, Suzan H.M.; Geisbrecht, Brian V.
2014-01-01
The pathogenic bacterium Staphylococcus aureus actively evades many aspects of human innate immunity by expressing a series of small inhibitory proteins. A number of these proteins inhibit the complement system, which labels bacteria for phagocytosis and generates inflammatory chemoattractants. While the majority of staphylococcal complement inhibitors act on the alternative pathway (AP) to block the amplification loop, only a few proteins act on the initial recognition cascades that constitute the classical (CP) and lectin (LP) pathways. We screened a collection of recombinant, secreted staphylococcal proteins to determine if S. aureus produces other molecules that inhibit either the CP and/or LP. Using this approach, we identified the extracellular adherence protein (Eap) as a potent, specific inhibitor of both the CP and LP. We found that Eap blocked CP/LP-dependent activation of C3, but not C4, and that Eap likewise inhibited deposition of C3b on the surface of S. aureus cells. In turn, this significantly diminished the extent of S. aureus opsonophagocytosis and killing by neutrophils. This combination of functional properties suggested that Eap acts specifically at the level of the CP/LP C3 convertase (C4b2a). Indeed, we demonstrated a direct, nanomolar-affinity interaction of Eap with C4b. Eap binding to C4b inhibited binding of both full-length C2 and its C2b fragment, which indicated that Eap disrupts formation of the CP/LP C3 pro-convertase (C4b2). As a whole, our results demonstrate that S. aureus inhibits the two initiation routes of complement by expression of the Eap protein, and thereby define a novel mechanism of immune evasion. PMID:25381436
Rozenberg, Perri; Ziporen, Lea; Gancz, Dana; Saar-Ray, Moran; Fishelson, Zvi
2018-02-02
Cancer cells are commonly more resistant to cell death activated by the membranolytic protein complex C5b-9. Several surface-expressed and intracellular proteins that protect cells from complement-dependent cytotoxicity (CDC) have been identified. In this study, we investigated the function of heat shock protein 90 (Hsp90), an essential and ubiquitously expressed chaperone, overexpressed in cancer cells, in C5b-9-induced cell death. As shown, inhibition of Hsp90 with geldanamycin or radicicol is enhancing sensitivity of K562 erythroleukemia cells to CDC. Similarly, Hsp90 inhibition confers in Ramos B cell lymphoma cells elevated sensitivity to treatment with rituximab and complement. C5b-9 deposition is elevated on geldanamycin-treated cells. Purified Hsp90 binds directly to C9 and inhibits zinc-induced C9 polymerization, indicating that Hsp90 may act directly on the C5b-9 complex. Mortalin, also known as stress protein 70 or GRP75, is a mitochondrial chaperone that confers resistance to CDC. The postulated cooperation between Hsp90 and mortalin in protection from CDC was tested. Geldanamycin failed to sensitize toward CDC cells with knocked down mortalin. Direct binding of Hsp90 to mortalin was shown by co-immunoprecipitation in cell extracts after triggering with complement as well as by using purified recombinant proteins. These results provide an insight into the protective mechanisms utilized by cancer cells to evade CDC. They suggest that Hsp90 protects cells from CDC by inhibiting, together with mortalin, C5b-9 assembly and/or stability at the plasma membrane.
Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.
Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie
2017-10-23
This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.
Identification of a central role for complement in osteoarthritis
Wang, Qian; Rozelle, Andrew L.; Lepus, Christin M.; Scanzello, Carla R.; Song, Jason J.; Larsen, D. Meegan; Crish, James F.; Bebek, Gurkan; Ritter, Susan Y.; Lindstrom, Tamsin M.; Hwang, Inyong; Wong, Heidi H.; Punzi, Leonardo; Encarnacion, Angelo; Shamloo, Mehrdad; Goodman, Stuart B.; Wyss-Coray, Tony; Goldring, Steven R.; Banda, Nirmal K.; Thurman, Joshua M.; Gobezie, Reuben; Crow, Mary K.; Holers, V. Michael; Lee, David M.; Robinson, William H.
2011-01-01
Osteoarthritis, characterized by the breakdown of articular cartilage in synovial joints, has long been viewed as the result of “wear and tear”1. Although low-grade inflammation is detected in osteoarthritis, its role is unclear2–4. Here we identify a central role for the inflammatory complement system in the pathogenesis of osteoarthritis. Through proteomic and transcriptomic analyses of synovial fluids and membranes from individuals with osteoarthritis, we find that expression and activation of complement is abnormally high in human osteoarthritic joints. Using mice genetically deficient in C5, C6, or CD59a, we show that complement, and specifically the membrane attack complex (MAC)-mediated arm of complement, is critical to the development of arthritis in three different mouse models of osteoarthritis. Pharmacological modulation of complement in wild-type mice confirmed the results obtained with genetically deficient mice. Expression of inflammatory and degradative molecules was lower in chondrocytes from destabilized joints of C5-deficient mice than C5-sufficient mice, and MAC induced production of these molecules in cultured chondrocytes. Furthermore, MAC co-localized with matrix metalloprotease (MMP)-13 and with activated extracellular signal-regulated kinase (ERK) around chondrocytes in human osteoarthritic cartilage. Our findings indicate that dysregulation of complement in synovial joints plays a critical role in the pathogenesis of osteoarthritis. PMID:22057346
Pondman, Kirsten M; Sobik, Martin; Nayak, Annapurna; Tsolaki, Anthony G; Jäkel, Anne; Flahaut, Emmanuel; Hampel, Silke; Ten Haken, Bennie; Sim, Robert B; Kishore, Uday
2014-08-01
Carbon nanotubes (CNTs) have promised a range of applications in biomedicine. Although influenced by the dispersants used, CNTs are recognized by the innate immune system, predominantly by the classical pathway of the complement system. Here, we confirm that complement activation by the CNT used continues up to C3 and C5, indicating that the entire complement system is activated including the formation of membrane-attack complexes. Using recombinant forms of the globular regions of human C1q (gC1q) as inhibitors of CNT-mediated classical pathway activation, we show that C1q, the first recognition subcomponent of the classical pathway, binds CNTs via the gC1q domain. Complement opsonisation of CNTs significantly enhances their uptake by U937 cells, with concomitant downregulation of pro-inflammatory cytokines and up-regulation of anti-inflammatory cytokines in both U937 cells and human monocytes. We propose that CNT-mediated complement activation may cause recruitment of cellular infiltration, followed by phagocytosis without inducing a pro-inflammatory immune response. This study highlights the importance of the complement system in response to carbon nanontube administration, suggesting that the ensuing complement activation may cause recruitment of cellular infiltration, followed by phagocytosis without inducing a pro-inflammatory immune response. Copyright © 2014 Elsevier Inc. All rights reserved.
Eculizumab for Dense Deposit Disease and C3 Glomerulonephritis
Smith, Richard J.; Barile, Gaetano R.; Zhang, Yuzhou; Heher, Eliot C.; Herlitz, Leal; Stokes, M. Barry; Markowitz, Glen S.; D’Agati, Vivette D.; Canetta, Pietro A.; Radhakrishnan, Jai; Appel, Gerald B.
2012-01-01
Summary Background and objectives The principle defect in dense deposit disease and C3 glomerulonephritis is hyperactivity of the alternative complement pathway. Eculizumab, a monoclonal antibody that binds to C5 to prevent formation of the membrane attack complex, may prove beneficial. Design, setting, participants, & measurements In this open-label, proof of concept efficacy and safety study, six subjects with dense deposit disease or C3 glomerulonephritis were treated with eculizumab every other week for 1 year. All had proteinuria >1 g/d and/or AKI at enrollment. Subjects underwent biopsy before enrollment and repeat biopsy at the 1-year mark. Results The subjects included three patients with dense deposit disease (including one patient with recurrent dense deposit disease in allograft) and three patients with C3 glomerulonephritis (including two patients with recurrent C3 glomerulonephritis in allograft). Genetic and complement function testing revealed a mutation in CFH and MCP in one subject each, C3 nephritic factor in three subjects, and elevated levels of serum membrane attack complex in three subjects. After 12 months, two subjects showed significantly reduced serum creatinine, one subject achieved marked reduction in proteinuria, and one subject had stable laboratory parameters but histopathologic improvements. Elevated serum membrane attack complex levels normalized on therapy and paralleled improvements in creatinine and proteinuria. Conclusions Clinical and histopathologic data suggest a response to eculizumab in some but not all subjects with dense deposit disease and C3 glomerulonephritis. Elevation of serum membrane attack complex before treatment may predict response. Additional research is needed to define the subgroup of dense deposit disease/C3 glomerulonephritis patients in whom eculizumab therapy can be considered. PMID:22403278
Lupia, Enrico; Del Sorbo, Lorenzo; Bergerone, Serena; Emanuelli, Giorgio; Camussi, Giovanni; Montrucchio, Giuseppe
2003-01-01
Thrombolytic agents, used to restore blood flow to ischaemic tissues, activate several enzymatic systems with pro-inflammatory effects, thus potentially contributing to the pathogenesis of ischaemia–reperfusion injury. Platelet-activating factor (PAF), a phospholipid mediator of inflammation, has been implicated in the pathogenesis of this process. We previously showed that the infusion of streptokinase (SK) induces the intravascular release of PAF in patients with acute myocardial infarction (AMI), and that cultured human endothelial cells (EC) synthesized PAF in response to SK and plasmin (PLN). In the present study, we investigated the role of the membrane attack complex (MAC) of complement in the PLN-induced synthesis of PAF. In vivo, we showed a correlation between the levels of soluble terminal complement components (sC5b-9) and the concentrations of PAF detected in blood of patients with AMI infused with SK. In vitro both EC and polymorphonuclear neutrophils (PMN), incubated in the presence of PLN and normal human serum, showed an intense staining for the MAC neoepitope, while no staining was detected when they were incubated with PLN in the presence of heat-inactivated normal human serum. Moreover, the insertion of MAC on EC and PMN plasmamembrane elicited the synthesis of PAF. In conclusion, our results elucidate the mechanisms involved in PAF production during the activation of the fibrinolytic system, showing a role for complement products in this setting. The release of PAF may increase the inflammatory response, thus limiting the beneficial effects of thrombolytic therapy. Moreover, it may have a pathogenic role in other pathological conditions, such as transplant rejection, tumoral angiogenesis, and septic shock, where fibrinolysis is activated. PMID:12871223
Lupia, Enrico; Del Sorbo, Lorenzo; Bergerone, Serena; Emanuelli, Giorgio; Camussi, Giovanni; Montrucchio, Giuseppe
2003-08-01
Thrombolytic agents, used to restore blood flow to ischaemic tissues, activate several enzymatic systems with pro-inflammatory effects, thus potentially contributing to the pathogenesis of ischaemia-reperfusion injury. Platelet-activating factor (PAF), a phospholipid mediator of inflammation, has been implicated in the pathogenesis of this process. We previously showed that the infusion of streptokinase (SK) induces the intravascular release of PAF in patients with acute myocardial infarction (AMI), and that cultured human endothelial cells (EC) synthesized PAF in response to SK and plasmin (PLN). In the present study, we investigated the role of the membrane attack complex (MAC) of complement in the PLN-induced synthesis of PAF. In vivo, we showed a correlation between the levels of soluble terminal complement components (sC5b-9) and the concentrations of PAF detected in blood of patients with AMI infused with SK. In vitro both EC and polymorphonuclear neutrophils (PMN), incubated in the presence of PLN and normal human serum, showed an intense staining for the MAC neoepitope, while no staining was detected when they were incubated with PLN in the presence of heat-inactivated normal human serum. Moreover, the insertion of MAC on EC and PMN plasmamembrane elicited the synthesis of PAF. In conclusion, our results elucidate the mechanisms involved in PAF production during the activation of the fibrinolytic system, showing a role for complement products in this setting. The release of PAF may increase the inflammatory response, thus limiting the beneficial effects of thrombolytic therapy. Moreover, it may have a pathogenic role in other pathological conditions, such as transplant rejection, tumoral angiogenesis, and septic shock, where fibrinolysis is activated.
Molina, C; Brun, J; Coulet, M; Betail, G; Wahl, D; Hartmann, L
1977-03-01
Six patients in a family with a history of hereditary angioedema reported swelling of the extremities and recurrent abdominal pain occurring spontaneously or after trauma. Attacks of oedema involving the airways, the greatest danger with this disorder, were present only in one case. This autosomal dominant disease is due to deficient activity of the inhibitor of the first component of complement. Low levels of C4, and absence of C1 esterase inhibitor confirm the diagnosis. Two asymptomatic cases with the appropriate biochemical abnormality are reported in this study. For short term prophylaxis of attacks (before surgery expecially), fresh frozen plasma is used, or better still, C1 esterase inhibitor. For long term prophylaxis of attacks antifibrinolytic and hormonal drugs are used: in two cases, the authors obtained good results with methyltestosterone after failure of tranexamic acid.
New Plastic Apron-Gutter for Gum Collection
Ralph W. Clements; H. Grady Williams
1981-01-01
A one-piece polyethylene apron-gutter has been developed and marketed to complement the plastic cup. The plastic system eliminates contamination from iron cups and gutters which have reduced gum grades for 70 years. Sulfuric acid will not attack the plastic apron-gutters. and the new system should prove durable for at least 4 years of continuous use.
Bloom, Anja C; Collins, Fraser L; Van't Hof, Rob J; Ryan, Elizabeth S; Jones, Emma; Hughes, Timothy R; Morgan, B Paul; Erlandsson, Malin; Bokarewa, Maria; Aeschlimann, Daniel; Evans, Bronwen A J; Williams, Anwen S
2016-03-01
Degenerative joint diseases such as osteoarthritis are characterised by aberrant region-specific bone formation and abnormal bone mineral content. A recent study suggested a role for the complement membrane attack complex in experimental models of osteoarthritis. Since CD59a is the principal regulator of the membrane attack complex in mice, we evaluated the impact of CD59a gene deletion upon maintenance of bone architecture. In vivo bone morphology analysis revealed that male CD59a-deficient mice have increased femur length and cortical bone volume, albeit with reduced bone mineral density. However, this phenomenon was not observed in female mice. Histomorphometric analysis of the trabecular bone showed increased rates of bone homeostasis, with both increased bone resorption and mineral apposition rate in CD59a-deficient male mice. When bone cells were studied in isolation, in vitro osteoclastogenesis was significantly increased in male CD59a-deficient mice, although osteoblast formation was not altered. Our data reveal, for the first time, that CD59a is a regulator of bone growth and homeostasis. CD59a ablation in male mice results in longer and wider bones, but with less density, which is likely a major contributing factor for their susceptibility to osteoarthritis. These findings increase our understanding of the role of complement regulation in degenerative arthritis. Copyright © 2016 Amgen Inc. Published by Elsevier Inc. All rights reserved.
Whitmore, S.Scott; Sohn, Elliott H.; Chirco, Kathleen R.; Drack, Arlene V.; Stone, Edwin M.; Tucker, Budd A.; Mullins, Robert F.
2015-01-01
Age-related macular degeneration (AMD) is a common and devastating disease that can result in severe visual dysfunction. Over the last decade, great progress has been made in identifying genetic variants that contribute to AMD, many of which lie in genes involved in the complement cascade. In this review we discuss the significance of complement activation in AMD, particularly with respect to the formation of the membrane attack complex in the aging choriocapillaris. We review the clinical, histological and biochemical data that indicate that vascular loss in the choroid occurs very early in the pathogenesis of AMD, and discuss the potential impact of vascular dropout on the retinal pigment epithelium, Bruch's membrane and the photoreceptor cells. Finally, we present a hypothesis for the pathogenesis of early AMD and consider the implications of this model on the development of new therapies. PMID:25486088
Whitmore, S Scott; Sohn, Elliott H; Chirco, Kathleen R; Drack, Arlene V; Stone, Edwin M; Tucker, Budd A; Mullins, Robert F
2015-03-01
Age-related macular degeneration (AMD) is a common and devastating disease that can result in severe visual dysfunction. Over the last decade, great progress has been made in identifying genetic variants that contribute to AMD, many of which lie in genes involved in the complement cascade. In this review we discuss the significance of complement activation in AMD, particularly with respect to the formation of the membrane attack complex in the aging choriocapillaris. We review the clinical, histological and biochemical data that indicate that vascular loss in the choroid occurs very early in the pathogenesis of AMD, and discuss the potential impact of vascular dropout on the retinal pigment epithelium, Bruch's membrane and the photoreceptor cells. Finally, we present a hypothesis for the pathogenesis of early AMD and consider the implications of this model on the development of new therapies. Copyright © 2014 Elsevier Ltd. All rights reserved.
Strategic Analysis of Terrorism
NASA Astrophysics Data System (ADS)
Arce, Daniel G.; Sandler, Todd
Two areas that are increasingly studied in the game-theoretic literature on terrorism and counterterrorism are collective action and asymmetric information. One contribution of this chapter is a survey and extension of continuous policy models with differentiable payoff functions. In this way, policies can be characterized as strategic substitutes (e. g., proactive measures), or strategic complements (e. g., defensive measures). Mixed substitute-complement models are also introduced. We show that the efficiency of counterterror policy depends upon (i) the strategic substitutes-complements characterization, and (ii) who initiates the action. Surprisingly, in mixed-models the dichotomy between individual and collective action may disappear. A second contribution is the consideration of a signaling model where indiscriminant spectacular terrorist attacks may erode terrorists’ support among its constituency, and proactive government responses can create a backlash effect in favor of terrorists. A novel equilibrium of this model reflects the well-documented ineffectiveness of terrorism in achieving its stated goals.
Krutzke, L; Prill, J M; Engler, T; Schmidt, C Q; Xu, Z; Byrnes, A P; Simmet, T; Kreppel, F
2016-08-10
The biodistribution of adenovirus type 5 (Ad5) vector particles is heavily influenced by interaction of the particles with plasma proteins, including coagulation factor X (FX), which binds specifically to the major Ad5 capsid protein hexon. FX mediates hepatocyte transduction by intravenously-injected Ad5 vectors and shields vector particles from neutralization by natural antibodies and complement. In mice, mutant Ad5 vectors that are ablated for FX-binding become detargeted from hepatocytes, which is desirable for certain applications, but unfortunately such FX-nonbinding vectors also become sensitive to neutralization by mouse plasma proteins. To improve the properties of Ad5 vectors for systemic delivery, we developed a strategy to replace the natural FX shield by a site-specific chemical polyethylene glycol shield. Coupling of polyethylene glycol to a specific site in hexon hypervariable region 1 yielded vector particles that were protected from neutralization by natural antibodies and complement although they were unable to bind FX. These vector particles evaded macrophages in vitro and showed significantly improved pharmacokinetics and hepatocyte transduction in vivo. Thus, site-specific shielding of Ad5 vectors with polyethylene glycol rendered vectors FX-independent and greatly improved their properties for systemic gene therapy. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.
Complement is activated in progressive multiple sclerosis cortical grey matter lesions.
Watkins, Lewis M; Neal, James W; Loveless, Sam; Michailidou, Iliana; Ramaglia, Valeria; Rees, Mark I; Reynolds, Richard; Robertson, Neil P; Morgan, B Paul; Howell, Owain W
2016-06-22
The symptoms of multiple sclerosis (MS) are caused by damage to myelin and nerve cells in the brain and spinal cord. Inflammation is tightly linked with neurodegeneration, and it is the accumulation of neurodegeneration that underlies increasing neurological disability in progressive MS. Determining pathological mechanisms at play in MS grey matter is therefore a key to our understanding of disease progression. We analysed complement expression and activation by immunocytochemistry and in situ hybridisation in frozen or formalin-fixed paraffin-embedded post-mortem tissue blocks from 22 progressive MS cases and made comparisons to inflammatory central nervous system disease and non-neurological disease controls. Expression of the transcript for C1qA was noted in neurons and the activation fragment and opsonin C3b-labelled neurons and glia in the MS cortical and deep grey matter. The density of immunostained cells positive for the classical complement pathway protein C1q and the alternative complement pathway activation fragment Bb was significantly increased in cortical grey matter lesions in comparison to control grey matter. The number of cells immunostained for the membrane attack complex was elevated in cortical lesions, indicating complement activation to completion. The numbers of classical (C1-inhibitor) and alternative (factor H) pathway regulator-positive cells were unchanged between MS and controls, whilst complement anaphylatoxin receptor-bearing microglia in the MS cortex were found closely apposed to cortical neurons. Complement immunopositive neurons displayed an altered nuclear morphology, indicative of cell stress/damage, supporting our finding of significant neurodegeneration in cortical grey matter lesions. Complement is activated in the MS cortical grey matter lesions in areas of elevated numbers of complement receptor-positive microglia and suggests that complement over-activation may contribute to the worsening pathology that underlies the irreversible progression of MS.
Intervention of Phytohormone Pathways by Pathogen Effectors[OPEN
Kazan, Kemal; Lyons, Rebecca
2014-01-01
The constant struggle between plants and microbes has driven the evolution of multiple defense strategies in the host as well as offense strategies in the pathogen. To defend themselves from pathogen attack, plants often rely on elaborate signaling networks regulated by phytohormones. In turn, pathogens have adopted innovative strategies to manipulate phytohormone-regulated defenses. Tactics frequently employed by plant pathogens involve hijacking, evading, or disrupting hormone signaling pathways and/or crosstalk. As reviewed here, this is achieved mechanistically via pathogen-derived molecules known as effectors, which target phytohormone receptors, transcriptional activators and repressors, and other components of phytohormone signaling in the host plant. Herbivores and sap-sucking insects employ obligate pathogens such as viruses, phytoplasma, or symbiotic bacteria to intervene with phytohormone-regulated defenses. Overall, an improved understanding of phytohormone intervention strategies employed by pests and pathogens during their interactions with plants will ultimately lead to the development of new crop protection strategies. PMID:24920334
The evolution of mimicry under constraints.
Holen, Øistein Haugsten; Johnstone, Rufus A
2004-11-01
The resemblance between mimetic organisms and their models varies from near perfect to very crude. One possible explanation, which has received surprisingly little attention, is that evolution can improve mimicry only at some cost to the mimetic organism. In this article, an evolutionary game theory model of mimicry is presented that incorporates such constraints. The model generates novel and testable predictions. First, Batesian mimics that are very common and/or mimic very weakly defended models should evolve either inaccurate mimicry (by stabilizing selection) or mimetic polymorphism. Second, Batesian mimics that are very common and/or mimic very weakly defended models are more likely to evolve mimetic polymorphism if they encounter predators at high rates and/or are bad at evading predator attacks. The model also examines how cognitive constraints acting on signal receivers may help determine evolutionarily stable levels of mimicry. Surprisingly, improved discrimination abilities among signal receivers may sometimes select for less accurate mimicry.
Basics of PD-1 in self-tolerance, infection, and cancer immunity.
Chikuma, Shunsuke
2016-06-01
Successful cancer treatment requires understanding host immune response against tumor cells. PD-1 belongs to the CD28 superfamily of receptors that work as "checkpoints" of immune activation. PD-1 maintains immune self-tolerance to prevent autoimmunity and controls T-cell reaction during infection to prevent excessive tissue damage. Tumor cells that arise from normal tissue acquire mutations that can be targeted by lymphocytes. Accumulating lines of evidence suggest that tumor cells evade host immune attack by expressing physiological PD-1 ligands and stimulating PD-1 on the lymphocytes. Based on this idea, researchers have successfully demonstrated that systemic administration of monoclonal antibodies that inhibit the binding of PD-1 to the ligands reactivated T cells and augmented the anti-cancer immune response. In this review, I summarize the basics of T-cell biology and its regulation by PD-1 and discuss the current understanding and questions about this multifaceted molecule.
Pfeilmeier, Sebastian; Saur, Isabel Marie-Luise; Rathjen, John Paul; Zipfel, Cyril; Malone, Jacob George
2016-05-01
The plant innate immune system employs plasma membrane-localized receptors that specifically perceive pathogen/microbe-associated molecular patterns (PAMPs/MAMPs). This induces a defence response called pattern-triggered immunity (PTI) to fend off pathogen attack. Commensal bacteria are also exposed to potential immune recognition and must employ strategies to evade and/or suppress PTI to successfully colonize the plant. During plant infection, the flagellum has an ambiguous role, acting as both a virulence factor and also as a potent immunogen as a result of the recognition of its main building block, flagellin, by the plant pattern recognition receptors (PRRs), including FLAGELLIN SENSING2 (FLS2). Therefore, strict control of flagella synthesis is especially important for plant-associated bacteria. Here, we show that cyclic-di-GMP [bis-(3'-5')-cyclic di-guanosine monophosphate], a central regulator of bacterial lifestyle, is involved in the evasion of PTI. Elevated cyclic-di-GMP levels in the pathogen Pseudomonas syringae pv. tomato (Pto) DC3000, the opportunist P. aeruginosa PAO1 and the commensal P. protegens Pf-5 inhibit flagellin synthesis and help the bacteria to evade FLS2-mediated signalling in Nicotiana benthamiana and Arabidopsis thaliana. Despite this, high cellular cyclic-di-GMP concentrations were shown to drastically reduce the virulence of Pto DC3000 during plant infection. We propose that this is a result of reduced flagellar motility and/or additional pleiotropic effects of cyclic-di-GMP signalling on bacterial behaviour. © 2015 THE AUTHORS MOLECULAR PLANT PATHOLOGY PUBLISHED BY BRITISH SOCIETY FOR PLANT PATHOLOGY AND JOHN WILEY & SONS LTD.
Genetic characteristics and pathogenic mechanisms of periodontal pathogens.
Amano, A; Chen, C; Honma, K; Li, C; Settem, R P; Sharma, A
2014-05-01
Periodontal disease is caused by a group of bacteria that utilize a variety of strategies and molecular mechanisms to evade or overcome host defenses. Recent research has uncovered new evidence illuminating interesting aspects of the virulence of these bacteria and their genomic variability. This paper summarizes some of the strategies utilized by the major species - Aggregatibacter actinomycetemcomitans, Tannerella forsythia, Treponema denticola, and Porphyromonas gingivalis - implicated in the pathogenesis of periodontal disease. Whole-genome sequencing of 14 diverse A. actinomycetemcomitans strains has revealed variations in their genetic content (ranging between 0.4% and 19.5%) and organization. Strikingly, isolates from human periodontal sites showed no genomic changes during persistent colonization. T. forsythia manipulates the cytokine responses of macrophages and monocytes through its surface glycosylation. Studies have revealed that bacterial surface-expressed O-linked glycans modulate T-cell responses during periodontal inflammation. Periodontal pathogens belonging to the "red complex" consortium express neuraminidases, which enables them to scavenge sialic acid from host glycoconjugates. Analysis of recent data has demonstrated that the cleaved sialic acid acts as an important nutrient for bacterial growth and a molecule for the decoration of bacteria surfaces to help evade the host immune attack. In addition, bacterial entry into host cells is also an important prerequisite for the lifestyle of periodontal pathogens such as P. gingivalis. Studies have shown that, after its entry into the cell, this bacterium uses multiple sorting pathways destined for autophagy, lysosomes, or recycling pathways. In addition, P. gingivalis releases outer membrane vesicles which enter cells via endocytosis and cause cellular functional impairment.
Liang, Yujun; Zhang, Shicui; Wang, Zhiping
2009-01-01
The eggs in most invertebrates are fertilized externally, and therefore their resulting embryos are exposed to an environment full of microbes, many of which are pathogens capable of killing other organisms. How the developing embryos of invertebrates defend themselves against pathogenic attacks is an intriguing question to biologists, and remains largely unknown. Here we clearly demonstrated that the egg cytosol prepared from the newly fertilized eggs of amphioxus Branchiostoma belcheri, an invertebrate chordate, was able to inhibit the growth of both the Gram-negative bacterium Vibrio anguillarum and the Gram-positive bacterium Staphylococcus aureus. All findings point to that it is the complement system operating via the alternative pathway that is attributable to the bacteriostatic activity. This appears to be the first report providing the evidence for the functional role of the maternal complement components in the eggs of invertebrate species, paving the way for the study of maternal immunity in other invertebrate organisms whose eggs are fertilized in vitro. It also supports the notion that the early developing embryos share some defense mechanisms common with the adult species.
[The complement system as a main actor in the pathogenesis of obstetric antiphospholipid syndrome].
Alijotas-Reig, Jaume
2010-01-23
Pregnancy losses are the main obstetrical complications of the obstetric antiphospholipid syndrome (obstetric-APS). Classically, they have been strongly attributed to thrombosis and further placental infarcts. But in some cases is not possible to show evidence of decidual thrombosis or placental vasculopathy, and sometimes inflammatory signs are present. Besides, the prevalence of systemic thrombosis is low in obstetric APS patients. Some cases have low plasma C4/C3 levels. Animal models show a local inflammatory mechanism. The beta2-glycoprotein-I/anti-beta2-glycoprotein-I complexes activate both, classical and alternative complement pathways. Complement proteins may injure trophoblast cells, recruiting and activating monocytes and neutrophils. Free radicals and proteolytic enzymes could also attack trophoblastic cells. In addition, an amplifier loop between the tissue factor, inflammatory cells and complement proteins could exist. Overall, these diverse mechanisms may explain both, inflammatory and thrombophilic placental alterations. In the end, the role played in this binomial by certain pro-inflammatory cytokines, mainly TNF-alpha, remains to clarify. Copyright 2009 Elsevier España, S.L. All rights reserved.
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
Factor H: A Complement Regulator in Health and Disease, and a Mediator of Cellular Interactions
Kopp, Anne; Hebecker, Mario; Svobodová, Eliška; Józsi, Mihály
2012-01-01
Complement is an essential part of innate immunity as it participates in host defense against infections, disposal of cellular debris and apoptotic cells, inflammatory processes and modulation of adaptive immune responses. Several soluble and membrane-bound regulators protect the host from the potentially deleterious effects of uncontrolled and misdirected complement activation. Factor H is a major soluble regulator of the alternative complement pathway, but it can also bind to host cells and tissues, protecting them from complement attack. Interactions of factor H with various endogenous ligands, such as pentraxins, extracellular matrix proteins and DNA are important in limiting local complement-mediated inflammation. Impaired regulatory as well as ligand and cell recognition functions of factor H, caused by mutations or autoantibodies, are associated with the kidney diseases: atypical hemolytic uremic syndrome and dense deposit disease and the eye disorder: age-related macular degeneration. In addition, factor H binds to receptors on host cells and is involved in adhesion, phagocytosis and modulation of cell activation. In this review we discuss current concepts on the physiological and pathophysiological roles of factor H in light of new data and recent developments in our understanding of the versatile roles of factor H as an inhibitor of complement activation and inflammation, as well as a mediator of cellular interactions. A detailed knowledge of the functions of factor H in health and disease is expected to unravel novel therapeutic intervention possibilities and to facilitate the development or improvement of therapies. PMID:24970127
Contributions to Pursuit-Evasion Game Theory
NASA Astrophysics Data System (ADS)
Oyler, Dave Wilson
This dissertation studies adversarial conflicts among a group of agents moving in the plane, possibly among obstacles, where some agents are pursuers and others are evaders. The goal of the pursuers is to capture the evaders, where capture requires a pursuer to be either co-located with an evader, or in close proximity. The goal of the evaders is to avoid capture. These scenarios, where different groups compete to accomplish conflicting goals, are referred to as pursuit-evasion games, and the agents are called players. Games featuring one pursuer and one evader are analyzed using dominance, where a point in the plane is said to be dominated by a player if that player is able to reach the point before the opposing players, regardless of the opposing players' actions. Two generalizations of the Apollonius circle are provided. One solves games with environments containing obstacles, and the other provides an alternative solution method for the Homicidal Chauffeur game. Optimal pursuit and evasion strategies based on dominance are provided. One benefit of dominance analysis is that it extends to games with many players. Two foundational games are studied; one features multiple pursuers against a single evader, and the other features a single pursuer against multiple evaders. Both are solved using dominance through a reduction to single pursuer, single evader games. Another game featuring competing teams of pursuers is introduced, where an evader cooperates with friendly pursuers to rendezvous before being captured by adversaries. Next, the assumption of complete and perfect information is relaxed, and uncertainties in player speeds, player positions, obstacle locations, and cost functions are studied. The sensitivity of the dominance boundary to perturbations in parameters is provided, and probabilistic dominance is introduced. The effect of information is studied by comparing solutions of games with perfect information to games with uncertainty. Finally, a pursuit law is developed that requires minimal information and highlights a limitation of dominance regions. These contributions extend pursuit-evasion game theory to a number of games that have not previously been solved, and in some cases, the solutions presented are more amenable to implementation than previous methods.
Innate Immune Mechanisms in Transplant Allograft Vasculopathy
Jane-wit, D; Fang, C; Goldstein, DR
2016-01-01
Purpose of Review Allograft vasculopathy (AV) is the leading cause of late allograft loss following solid organ transplantation. Ischemia reperfusion injury (IRI) and donor specific antibody (DSA)-induced complement activation confer heightened risk for AV via numerous innate immune mechanisms including MyD88, HMGB1, and complement induced non-canonical NF-kB signaling. Recent Findings The role of MyD88, a signal adaptor downstream of the toll-like receptors (TLR), has been defined in an experimental heart transplant model, which demonstrated that recipient MyD88 enhanced AV. Importantly, triggering receptor on myeloid receptor 1(Trem1), a MyD88 amplifying signal, was present in rejecting human cardiac transplant biopsies and enhanced the development of AV in mice. HMGB1, a nuclear protein that activates TLRs, also enhanced the development of AV. Complement activation elicits assembly of membrane attack complexes (MAC) on endothelial cells which activate non-canonical NF-kB signaling, a novel complement effector pathway that induces pro-inflammatory genes and potentiates endothelial cell mediated alloimmune T cell activation, processes which enhance AV. Summary Innate immune mediators including HMGB1, MyD88, and non-canonical NFκB signaling via complement activation contribute to AV. These pathways represent potential therapeutic targets to reduce AV after solid organ transplantation. PMID:27077602
Bahia El Idrissi, Nawal; Das, Pranab K; Fluiter, Kees; Rosa, Patricia S; Vreijling, Jeroen; Troost, Dirk; Morgan, B Paul; Baas, Frank; Ramaglia, Valeria
2015-05-01
Peripheral nerve damage is the hallmark of leprosy pathology but its etiology is unclear. We previously identified the membrane attack complex (MAC) of the complement system as a key determinant of post-traumatic nerve damage and demonstrated that its inhibition is neuroprotective. Here, we determined the contribution of the MAC to nerve damage caused by Mycobacterium leprae and its components in mouse. Furthermore, we studied the association between MAC and the key M. leprae component lipoarabinomannan (LAM) in nerve biopsies of leprosy patients. Intraneural injections of M. leprae sonicate induced MAC deposition and pathological changes in the mouse nerve, whereas MAC inhibition preserved myelin and axons. Complement activation occurred mainly via the lectin pathway and the principal activator was LAM. In leprosy nerves, the extent of LAM and MAC immunoreactivity was robust and significantly higher in multibacillary compared to paucibacillary donors (p = 0.01 and p = 0.001, respectively), with a highly significant association between LAM and MAC in the diseased samples (r = 0.9601, p = 0.0001). Further, MAC co-localized with LAM on axons, pointing to a role for this M. leprae antigen in complement activation and nerve damage in leprosy. Our findings demonstrate that MAC contributes to nerve damage in a model of M. leprae-induced nerve injury and its inhibition is neuroprotective. In addition, our data identified LAM as the key pathogen associated molecule that activates complement and causes nerve damage. Taken together our data imply an important role of complement in nerve damage in leprosy and may inform the development of novel therapeutics for patients.
Tüzün, Erdem; Scott, Benjamin G; Goluszko, Elzbieta; Higgs, Stephen; Christadoss, Premkumar
2003-10-01
Abs to acetylcholine receptor (AChR) and complement are the major constituents of pathogenic events causing neuromuscular junction destruction in both myasthenia gravis (MG) and experimental autoimmune MG (EAMG). To analyze the differential roles of the classical vs alternative complement pathways in EAMG induction, we immunized C3(-/-), C4(-/-), C3(+/-), and C4(+/-) mice and their control littermates (C3(+/+) and C4(+/+) mice) with AChR in CFA. C3(-/-) and C4(-/-) mice were resistant to disease, whereas mice heterozygous for C3 or C4 displayed intermediate susceptibility. Although C3(-/-) and C4(-/-) mice had anti-AChR Abs in their sera, anti-AChR IgG production by C3(-/-) mice was significantly suppressed. Both C3(-/-) and C4(-/-) mice had reduced levels of B cells and increased expression of apoptotis inducers (Fas ligand, CD69) and apoptotic cells in lymph nodes. Immunofluorescence studies showed that the neuromuscular junction of C3(-/-) and C4(-/-) mice lacked C3 or membrane attack complex deposits, despite having IgG deposits, thus providing in vivo evidence for the incapacity of anti-AChR IgGs to induce full-blown EAMG without the aid of complements. The data provide the first direct genetic evidence for the classical complement pathway in the induction of EAMG induced by AChR immunization. Accordingly, severe MG and other Ab- and complement-mediated diseases could be effectively treated by inhibiting C4, thus leaving the alternative complement pathway intact.
Devarapu, Satish Kumar; Mamidi, Srinivas; Plöger, Frank; Dill, Othmar; Blixt, Ola; Kirschfink, Michael; Schwartz-Albiez, Reinhard
2016-06-15
A small percentage of healthy donors identified in the Western population carry antibodies in their peripheral blood which convey cytotoxic activity against certain human melanoma and neuroblastoma cell lines. We measured the cytotoxic activity of sera and plasmas from healthy donors on the human neuroblastoma cell line Kelly and various melanoma cell lines. Antibodies of IgM isotype, presumably belonging to the class of naturally occurring antibodies, exerted cytotoxic activity in a complement-dependent fashion. Apart from complement-dependent tumor cell lysis, we observed C3 opsonization in all tumor cell lines upon treatment with cytotoxic plasmas. Cell lines tested primarily expressed membrane complement regulatory proteins (mCRP) CD46, CD55 and CD59 to various extents. Blocking of mCRPs by monoclonal antibodies enhanced cell lysis and opsonization, though some melanoma cells remained resistant to complement attack. Epitopes recognized by cytotoxic antibodies were represented by gangliosides such as GD2 and GD3, as evidenced by cellular sialidase pretreatment and enhanced expression of distinct gangliosides. It remains to be clarified why only a small fraction of healthy persons carry these antitumor cytotoxic antibodies. © 2016 UICC.
2011-01-01
Trauma represents the leading cause of death among young people in industrialized countries. Recent clinical and experimental studies have brought increasing evidence for activation of the innate immune system in contributing to the pathogenesis of trauma-induced sequelae and adverse outcome. As the "first line of defense", the complement system represents a potent effector arm of innate immunity, and has been implicated in mediating the early posttraumatic inflammatory response. Despite its generic beneficial functions, including pathogen elimination and immediate response to danger signals, complement activation may exert detrimental effects after trauma, in terms of mounting an "innocent bystander" attack on host tissue. Posttraumatic ischemia/reperfusion injuries represent the classic entity of complement-mediated tissue damage, adding to the "antigenic load" by exacerbation of local and systemic inflammation and release of toxic mediators. These pathophysiological sequelae have been shown to sustain the systemic inflammatory response syndrome after major trauma, and can ultimately contribute to remote organ injury and death. Numerous experimental models have been designed in recent years with the aim of mimicking the inflammatory reaction after trauma and to allow the testing of new pharmacological approaches, including the emergent concept of site-targeted complement inhibition. The present review provides an overview on the current understanding of the cellular and molecular mechanisms of complement activation after major trauma, with an emphasis of emerging therapeutic concepts which may provide the rationale for a "bench-to-bedside" approach in the design of future pharmacological strategies. PMID:22129197
Qamra, Aditi; Xing, Manjie; Padmanabhan, Nisha; Kwok, Jeffrey Jun Ting; Zhang, Shenli; Xu, Chang; Leong, Yan Shan; Lee Lim, Ai Ping; Tang, Qianqao; Ooi, Wen Fong; Suling Lin, Joyce; Nandi, Tannistha; Yao, Xiaosai; Ong, Xuewen; Lee, Minghui; Tay, Su Ting; Keng, Angie Tan Lay; Gondo Santoso, Erna; Ng, Cedric Chuan Young; Ng, Alvin; Jusakul, Apinya; Smoot, Duane; Ashktorab, Hassan; Rha, Sun Young; Yeoh, Khay Guan; Peng Yong, Wei; Chow, Pierce K H; Chan, Weng Hoong; Ong, Hock Soo; Soo, Khee Chee; Kim, Kyoung-Mee; Wong, Wai Keong; Rozen, Steven G; Teh, Bin Tean; Kappei, Dennis; Lee, Jeeyun; Connolly, John; Tan, Patrick
2017-06-01
Promoter elements play important roles in isoform and cell type-specific expression. We surveyed the epigenomic promoter landscape of gastric adenocarcinoma, analyzing 110 chromatin profiles (H3K4me3, H3K4me1, H3K27ac) of primary gastric cancers, gastric cancer lines, and nonmalignant gastric tissues. We identified nearly 2,000 promoter alterations (somatic promoters), many deregulated in various epithelial malignancies and mapping frequently to alternative promoters within the same gene, generating potential pro-oncogenic isoforms ( RASA3 ). Somatic promoter-associated N-terminal peptides displaying relative depletion in tumors exhibited high-affinity MHC binding predictions and elicited potent T-cell responses in vitro , suggesting a mechanism for reducing tumor antigenicity. In multiple patient cohorts, gastric cancers with high somatic promoter usage also displayed reduced T-cell cytolytic marker expression. Somatic promoters are enriched in PRC2 occupancy, display sensitivity to EZH2 therapeutic inhibition, and are associated with novel cancer-associated transcripts. By generating tumor-specific isoforms and decreasing tumor antigenicity, epigenomic promoter alterations may thus drive intrinsic tumorigenesis and also allow nascent cancers to evade host immunity. Significance: We apply epigenomic profiling to demarcate the promoter landscape of gastric cancer. Many tumor-specific promoters activate different promoters in the same gene, some generating pro-oncogenic isoforms. Tumor-specific promoters also reduce tumor antigenicity by causing relative depletion of immunogenic peptides, contributing to cancer immunoediting and allowing tumors to evade host immune attack. Cancer Discov; 7(6); 630-51. ©2017 AACR. This article is highlighted in the In This Issue feature, p. 539 . ©2017 American Association for Cancer Research.
Chronic dermatophytosis: what is special about Trichophyton rubrum?
Dahl, M V; Grando, S A
1994-01-01
T. rubrum is especially suited to survive on the skin surface. We have presented data to show how it accomplishes this. We will now combine these data with our own thoughts to speculate about how T. rubrum has adapted to the skin of human beings. We believe the organism uses several different strategies. First, many infected patients cannot elicit a cell-mediated immune response to eliminate the fungus. The reasons for this are not completely clear, but trichophytin skin tests are negative at 48 hours despite persistent, chronic, and even widespread infections. Antigens are present on T. rubrum, just as they are on other dermatophytes, but differences in antigen penetration through the skin may prevent induction of immunity. Perhaps, neonatal exposure to the fungus or to cross-reacting antigens of molds may induce tolerance by confusing antigen recognition of self vs. nonself. More likely, persistent infection induces immunologic unresponsiveness by activating specific suppressor T cells. In fact, our attempts to clone T. rubrum-specific T cells from peripherals blood have always yielded suppressor cells, and these cells even suppress proliferation of the clone itself. Second, mannans from T. rubrum probably are better able to suppress cell-mediated immune reactions than are mannans from other fungi. T. rubrum may make more mannan than do other dermatophytes, and the mannan may be a more potent immunosuppressor than are mannans from other dermatophytes. Mannan apparently works by inhibiting critical steps in antigen processing or presentation. This inhibits the immune reaction. Perhaps, mannan even can prevent induction under certain circumstances. Third, T. rubrum is not especially aggressive compared with other dermatophytes. By remaining in the stratum corneum, it may evade immune surveillance, and may evade complement and polymorphonuclear leukocytes that would attach the organism if it tried to invade into viable epidermis. Finally, T. rubrum can survive off the human body as a spore. Its life cycle apparently lets spores desquamate and, thereby, remain plentiful in many human habitats. If a spore finds a warm, moist area of skin, it can crowd out normal flora and grow within the stratum corneum. T. rubrum's ability to infect and its ubiquitous presence account for the high incidence of infections. This, plus the ability of T. rubrum to evade host defenses, accounts for the high prevalence of infections with this fungus.
Beum, Paul V; Lindorfer, Margaret A; Beurskens, Frank; Stukenberg, P Todd; Lokhorst, Henk M; Pawluczkowycz, Andrew W; Parren, Paul W H I; van de Winkel, Jan G J; Taylor, Ronald P
2008-07-01
Binding of the CD20 mAb rituximab (RTX) to B lymphocytes in normal human serum (NHS) activates complement (C) and promotes C3b deposition on or in close proximity to cell-bound RTX. Based on spinning disk confocal microscopy analyses, we report the first real-time visualization of C3b deposition and C-mediated killing of RTX-opsonized B cells. C activation by RTX-opsonized Daudi B cells induces rapid membrane blebbing and generation of long, thin structures protruding from cell surfaces, which we call streamers. Ofatumumab, a unique mAb that targets a distinct binding site (the small loop epitope) of the CD20 Ag, induces more rapid killing and streaming on Daudi cells than RTX. In contrast to RTX, ofatumumab promotes streamer formation and killing of ARH77 cells and primary B cells from patients with chronic lymphocytic leukemia. Generation of streamers requires C activation; no streaming occurs in media, NHS-EDTA, or in sera depleted of C5 or C9. Streamers can be visualized in bright field by phase imaging, and fluorescence-staining patterns indicate they contain membrane lipids and polymerized actin. Streaming also occurs if cells are reacted in medium with bee venom melittin, which penetrates cells and forms membrane pores in a manner similar to the membrane-attack complex of C. Structures similar to streamers are demonstrable when Ab-opsonized sheep erythrocytes (non-nucleated cells) are reacted with NHS. Taken together, our findings indicate that the membrane-attack complex is a key mediator of streaming. Streamer formation may, thus, represent a membrane structural change that can occur shortly before complement-induced cell death.
Du, Sienmi; Itoh, Noriko; Askarinam, Sahar; Hill, Haley; Arnold, Arthur P.; Voskuhl, Rhonda R.
2014-01-01
Women are more susceptible to multiple sclerosis (MS) and have more robust immune responses than men. However, men with MS tend to demonstrate a more progressive disease course than women, suggesting a disconnect between the severity of an immune attack and the CNS response to a given immune attack. We have previously shown in an MS model, experimental autoimmune encephalomyelitis, that autoantigen-sensitized XX lymph node cells, compared with XY, are more encephalitogenic. These studies demonstrated an effect of sex chromosomes in the induction of immune responses, but did not address a potential role of sex chromosomes in the CNS response to immune-mediated injury. Here, we examined this possibility using XX versus XY bone marrow chimeras reconstituted with a common immune system of one sex chromosomal type. We found that experimental autoimmune encephalomyelitis mice with an XY sex chromosome complement in the CNS, compared with XX, demonstrated greater clinical disease severity with more neuropathology in the spinal cord, cerebellum, and cerebral cortex. A candidate gene on the X chromosome, toll-like receptor 7, was then examined. Toll-like receptor 7 expression in cortical neurons was higher in mice with XY compared with mice with XX CNS, consistent with the known neurodegenerative role for toll-like receptor 7 in neurons. These results suggest that sex chromosome effects on neurodegeneration in the CNS run counter to effects on immune responses, and may bear relevance to the clinical enigma of greater MS susceptibility in women but faster disability progression in men. This is a demonstration of a direct effect of sex chromosome complement on neurodegeneration in a neurological disease. PMID:24550311
Du, Sienmi; Itoh, Noriko; Askarinam, Sahar; Hill, Haley; Arnold, Arthur P; Voskuhl, Rhonda R
2014-02-18
Women are more susceptible to multiple sclerosis (MS) and have more robust immune responses than men. However, men with MS tend to demonstrate a more progressive disease course than women, suggesting a disconnect between the severity of an immune attack and the CNS response to a given immune attack. We have previously shown in an MS model, experimental autoimmune encephalomyelitis, that autoantigen-sensitized XX lymph node cells, compared with XY, are more encephalitogenic. These studies demonstrated an effect of sex chromosomes in the induction of immune responses, but did not address a potential role of sex chromosomes in the CNS response to immune-mediated injury. Here, we examined this possibility using XX versus XY bone marrow chimeras reconstituted with a common immune system of one sex chromosomal type. We found that experimental autoimmune encephalomyelitis mice with an XY sex chromosome complement in the CNS, compared with XX, demonstrated greater clinical disease severity with more neuropathology in the spinal cord, cerebellum, and cerebral cortex. A candidate gene on the X chromosome, toll-like receptor 7, was then examined. Toll-like receptor 7 expression in cortical neurons was higher in mice with XY compared with mice with XX CNS, consistent with the known neurodegenerative role for toll-like receptor 7 in neurons. These results suggest that sex chromosome effects on neurodegeneration in the CNS run counter to effects on immune responses, and may bear relevance to the clinical enigma of greater MS susceptibility in women but faster disability progression in men. This is a demonstration of a direct effect of sex chromosome complement on neurodegeneration in a neurological disease.
Tran, Giang T; Hodgkinson, Suzanne J; Carter, Nicole M; Killingsworth, Murray; Nomura, Masaru; Verma, Nirupama D; Plain, Karren M; Boyd, Rochelle; Hall, Bruce M
2010-12-15
Antibody deposition and complement activation, especially membrane attack complex (MAC) formation are considered central for immune mediated demyelination. To examine the role of MAC in immune mediated demyelination, we studied experimental allergic neuritis (EAN) in Lewis rats deficient in complement component 6 (C6) that cannot form MAC. A C6 deficient Lewis (Lewis/C6-) strain of rats was bred by backcrossing the defective C6 gene, from PVG/C6- rats, onto the Lewis background. Lewis/C6- rats had the same C6 gene deletion as PVG/C6- rats and their sera did not support immune mediated haemolysis unless C6 was added. Active EAN was induced in Lewis and Lewis/C6- rats by immunization with bovine peripheral nerve myelin in complete Freund's adjuvant (CFA), and Lewis/C6- rats had delayed clinical EAN compared to the Lewis rats. Peripheral nerve demyelination in Lewis/C6- was also delayed but was similar in extent at the peak of disease. Compared to Lewis, Lewis/C6- nerves had no MAC deposition, reduced macrophage infiltrate and IL-17A, but similar T cell infiltrate and Th1 cytokine mRNA expression. ICAM-1 and P-selectin mRNA expression and immunostaining on vascular endothelium were delayed in Lewis C6- compared to Lewis rats' nerves. This study found that MAC was not required for immune mediated demyelination; but that MAC enhanced early symptoms and early demyelination in EAN, either by direct lysis or by sub-lytic induction of vascular endothelial expression of ICAM-1 and P-selectin. Copyright © 2010 Elsevier B.V. All rights reserved.
Klute, G K; Tasch, U; Geselowitz, D B
1992-04-01
This paper addresses the development and testing of an optimal position feedback controller for the Penn State electric ventricular-assist device (EVAD). The control law is designed to minimize the expected value of the EVAD's power consumption for a targeted patient population. The closed-loop control law is implemented on an Intel 8096 microprocessor and in vitro test runs show that this controller improves the EVAD's efficiency by 15-21%, when compared with the performance of the currently used feedforward control scheme.
High-Mobility Group Box 1-Induced Complement Activation Causes Sterile Inflammation.
Kim, Sook Young; Son, Myoungsun; Lee, Sang Eun; Park, In Ho; Kwak, Man Sup; Han, Myeonggil; Lee, Hyun Sook; Kim, Eun Sook; Kim, Jae-Young; Lee, Jong Eun; Choi, Ji Eun; Diamond, Betty; Shin, Jeon-Soo
2018-01-01
High-mobility group box 1 (HMGB1), a well-known danger-associated molecular pattern molecule, acts as a pro-inflammatory molecule when secreted by activated immune cells or released after necrotic cell damage. HMGB1 binds to immunogenic bacterial components and augments septic inflammation. In this study, we show how HMGB1 mediates complement activation, promoting sterile inflammation. We show that HMGB1 activates the classical pathway of complement system in an antibody-independent manner after binding to C1q. The C3a complement activation product in human plasma and C5b-9 membrane attack complexes on cell membrane surface are detected after the addition of HMGB1. In an acetaminophen (APAP)-induced hepatotoxicity model, APAP injection reduced HMGB1 levels and elevated C3 levels in C1q-deficient mouse serum samples, compared to that in wild-type (WT) mice. APAP-induced C3 consumption was inhibited by sRAGE treatment in WT mice. Moreover, in a mouse model of brain ischemia-reperfusion injury based on middle cerebral arterial occlusion, C5b-9 complexes were deposited on vessels where HMGB1 was accumulated, an effect that was suppressed upon HMGB1 neutralization. We propose that the HMGB1 released after cell necrosis and in ischemic condition can trigger the classical pathway of complement activation to exacerbate sterile inflammation.
High-Mobility Group Box 1-Induced Complement Activation Causes Sterile Inflammation
Kim, Sook Young; Son, Myoungsun; Lee, Sang Eun; Park, In Ho; Kwak, Man Sup; Han, Myeonggil; Lee, Hyun Sook; Kim, Eun Sook; Kim, Jae-Young; Lee, Jong Eun; Choi, Ji Eun; Diamond, Betty; Shin, Jeon-Soo
2018-01-01
High-mobility group box 1 (HMGB1), a well-known danger-associated molecular pattern molecule, acts as a pro-inflammatory molecule when secreted by activated immune cells or released after necrotic cell damage. HMGB1 binds to immunogenic bacterial components and augments septic inflammation. In this study, we show how HMGB1 mediates complement activation, promoting sterile inflammation. We show that HMGB1 activates the classical pathway of complement system in an antibody-independent manner after binding to C1q. The C3a complement activation product in human plasma and C5b-9 membrane attack complexes on cell membrane surface are detected after the addition of HMGB1. In an acetaminophen (APAP)-induced hepatotoxicity model, APAP injection reduced HMGB1 levels and elevated C3 levels in C1q-deficient mouse serum samples, compared to that in wild-type (WT) mice. APAP-induced C3 consumption was inhibited by sRAGE treatment in WT mice. Moreover, in a mouse model of brain ischemia–reperfusion injury based on middle cerebral arterial occlusion, C5b-9 complexes were deposited on vessels where HMGB1 was accumulated, an effect that was suppressed upon HMGB1 neutralization. We propose that the HMGB1 released after cell necrosis and in ischemic condition can trigger the classical pathway of complement activation to exacerbate sterile inflammation. PMID:29696019
Security of the food supply chain.
Setola, Roberto; De Maggio, Maria Carla
2009-01-01
The food supply chain could became a dangerous weapon in the hands of enemies, for this reason the strategies developed to fight food adulteration (food safety) should be complemented with specific actions devoted to improve food "security" in the sense of food defence. This paper illustrate the methodological approach used in the EU project SecuFood to analyze threats, vulnerabilities and countermeasures existing in major European countries about what concerns deliberate attacks and manipulations of food.
On the Origin of Cancer Metastasis
Seyfried, Thomas N.; Huysentruyt, Leanne C.
2013-01-01
Metastasis involves the spread of cancer cells from the primary tumor to surrounding tissues and to distant organs and is the primary cause of cancer morbidity and mortality. In order to complete the metastatic cascade, cancer cells must detach from the primary tumor, intravasate into the circulatory and lymphatic systems, evade immune attack, extravasate at distant capillary beds, and invade and proliferate in distant organs. Currently, several hypotheses have been advanced to explain the origin of cancer metastasis. These involve an epithelial mesenchymal transition, an accumulation of mutations in stem cells, a macrophage facilitation process, and a macrophage origin involving either transformation or fusion hybridization with neoplastic cells. Many of the properties of metastatic cancer cells are also seen in normal macrophages. A macrophage origin of metastasis can also explain the long-standing “seed and soil” hypothesis and the absence of metastasis in plant cancers. The view of metastasis as a macrophage metabolic disease can provide novel insight for therapeutic management. PMID:23237552
Unconditionally secure commitment in position-based quantum cryptography.
Nadeem, Muhammad
2014-10-27
A new commitment scheme based on position-verification and non-local quantum correlations is presented here for the first time in literature. The only credential for unconditional security is the position of committer and non-local correlations generated; neither receiver has any pre-shared data with the committer nor does receiver require trusted and authenticated quantum/classical channels between him and the committer. In the proposed scheme, receiver trusts the commitment only if the scheme itself verifies position of the committer and validates her commitment through non-local quantum correlations in a single round. The position-based commitment scheme bounds committer to reveal valid commitment within allocated time and guarantees that the receiver will not be able to get information about commitment unless committer reveals. The scheme works for the commitment of both bits and qubits and is equally secure against committer/receiver as well as against any third party who may have interests in destroying the commitment. Our proposed scheme is unconditionally secure in general and evades Mayers and Lo-Chau attacks in particular.
The hydrodynamics of predator-prey interactions in zebrafish
NASA Astrophysics Data System (ADS)
McHenry, Matthew; Soto, Alberto; Carrillo, Andres; Byron, Margaret
2017-11-01
Hydrodynamics govern the behavior of fishes when they operate as predators or prey. In addition to the role of fluid forces in propulsion, fishes relay on flow stimuli to sense a predatory threat and to localize palatable prey. We have performed a series of experiments on zebrafish (Danio rerio) that aim to resolve the major factors that determine whether prey survive an encounter with a predator. Zebrafish serve as a model system in this pursuit because the adults prey on larvae of the same species and the larvae are often successful in evading the attacks of the adults. We use a combination of theoretical and experimental approaches to resolve the behavioral algorithms and kinematics that determined the outcome of these interactions. In this context, the hydrodynamics of intermediate Reynolds numbers largely determines the range of flow stimuli and the limits to locomotor performance at dictate prey survival. These principles have the potential to apply to a broad diversity of fishes and other aquatic animals. ONR: N00014-15-1-2249.
Soral crypsis: protective mimicry of a coccid on an Indian fern.
Patra, Biplab; Bera, Subir; Hickey, R James
2008-06-01
Herbivory with crypsis is not well documented in ferns. The present record of cryptic coloration of coccid Saissetia filicum Boisduval (Homoptera: Coccidae) to the sori of a fern species Asplenium nidus L. (Aspleniaceae) is unique. Predatory beetles (Jauravia sp., Coleoptera: Coccinellidae) that feed on the coccids, are suggested to be selective pressure for the development of the present homopteran soral crypsis. A higher rate of effective predation is noticed in the vegetative leaves than the fertile leaves. Aggressive ants were found harvesting honeydew secretions from the coccids and defending the trophobionts as well as the host fern from their natural enemies. In addition, a possible three-way mutualistic relationship among the coccids, its host fern and the tending ant is suggested. Differential numbers of coccids on vegetative and fertile leaves is correlated with their phenol content and degree of predation by beetles. Such coloration mimicry by the coccids may enable them to obtain the necessary blend of sorus of the host fern needed to evade beetle detection and attack.
Lee, Sang Jae; Kim, Dong-Gyun; Lee, Kyu-Yeon; Koo, Ji Sung; Lee, Bong-Jin
2018-05-17
Oxidative stresses, such as reactive oxygen species, reactive electrophilic species, reactive nitrogen species, and reactive chlorine species, can damage cellular components, leading to cellular malfunction and death. In response to oxidative stress, bacteria have evolved redox-responsive sensors that enable them to simultaneously monitor and eradicate potential oxidative stress. Specifically, redox-sensing transcription regulators react to oxidative stress by means of modifying the thiol groups of cysteine residues, functioning as part of an efficient survival mechanism for many bacteria. In general, oxidative molecules can induce changes in the three-dimensional structures of redox sensors, which, in turn, affects the transcription of specific genes in detoxification pathways and defense mechanisms. Moreover, pathogenic bacteria utilize these redox sensors for adaptation and to evade subsequent oxidative attacks from host immune defense. For this reason, the redox sensors of pathogenic bacteria are potential antibiotic targets. Understanding the regulatory mechanisms of thiol-based redox sensors in bacteria will provide insight and knowledge into the discovery of new antibiotics.
The Lectin Pathway of Complement and Rheumatic Heart Disease
Beltrame, Marcia Holsbach; Catarino, Sandra Jeremias; Goeldner, Isabela; Boldt, Angelica Beate Winter; de Messias-Reason, Iara José
2014-01-01
The innate immune system is the first line of host defense against infection and is comprised of humoral and cellular mechanisms that recognize potential pathogens within minutes or hours of entry. The effector components of innate immunity include epithelial barriers, phagocytes, and natural killer cells, as well as cytokines and the complement system. Complement plays an important role in the immediate response against microorganisms, including Streptococcus sp. The lectin pathway is one of three pathways by which the complement system can be activated. This pathway is initiated by the binding of mannose-binding lectin (MBL), collectin 11 (CL-K1), and ficolins (Ficolin-1, Ficolin-2, and Ficolin-3) to microbial surface oligosaccharides and acetylated residues, respectively. Upon binding to target molecules, MBL, CL-K1, and ficolins form complexes with MBL-associated serine proteases 1 and 2 (MASP-1 and MASP-2), which cleave C4 and C2 forming the C3 convertase (C4b2a). Subsequent activation of complement cascade leads to opsonization, phagocytosis, and lysis of target microorganisms through the formation of the membrane-attack complex. In addition, activation of complement may induce several inflammatory effects, such as expression of adhesion molecules, chemotaxis and activation of leukocytes, release of reactive oxygen species, and secretion of cytokines and chemokines. In this chapter, we review the general aspects of the structure, function, and genetic polymorphism of lectin-pathway components and discuss most recent understanding on the role of the lectin pathway in the predisposition and clinical progression of Rheumatic Fever. PMID:25654073
Identification of the cellular receptor for anthrax toxin
NASA Astrophysics Data System (ADS)
Bradley, Kenneth A.; Mogridge, Jeremy; Mourez, Michael; Collier, R. John; Young, John A. T.
2001-11-01
The tripartite toxin secreted by Bacillus anthracis, the causative agent of anthrax, helps the bacterium evade the immune system and can kill the host during a systemic infection. Two components of the toxin enzymatically modify substrates within the cytosol of mammalian cells: oedema factor (OF) is an adenylate cyclase that impairs host defences through a variety of mechanisms including inhibiting phagocytosis; lethal factor (LF) is a zinc-dependent protease that cleaves mitogen-activated protein kinase kinase and causes lysis of macrophages. Protective antigen (PA), the third component, binds to a cellular receptor and mediates delivery of the enzymatic components to the cytosol. Here we describe the cloning of the human PA receptor using a genetic complementation approach. The receptor, termed ATR (anthrax toxin receptor), is a type I membrane protein with an extracellular von Willebrand factor A domain that binds directly to PA. In addition, a soluble version of this domain can protect cells from the action of the toxin.
Barnwal, Ravi Pratap; Loh, Edmund; Godin, Katherine S.; Yip, Jordan; Lavender, Hayley; Tang, Christoph M.; Varani, Gabriele
2016-01-01
Neisseria meningitidis causes bacterial meningitis and septicemia. It evades the host complement system by upregulating expression of immune evasion factors in response to changes in temperature. RNA thermometers within mRNAs control expression of bacterial immune evasion factors, including CssA, in the 5′-untranslated region of the operon for capsule biosynthesis. We dissect the molecular mechanisms of thermoregulation and report the structure of the CssA thermometer. We show that the RNA thermometer acts as a rheostat, whose stability is optimized to respond in a small temperature range around 37°C as occur within the upper airways during infection. Small increases in temperature gradually open up the structure to allow progressively increased access to the ribosome binding site. Even small changes in stability induced by mutations of imperfect base pairs, as in naturally occurring polymorphisms, shift the thermometer response outside of the desired temperature range, suggesting that its activity could be modulated by pharmacological intervention. PMID:27369378
Towards the final word on neutralino dark matter
NASA Astrophysics Data System (ADS)
Bramante, Joseph; Desai, Nishita; Fox, Patrick; Martin, Adam; Ostdiek, Bryan; Plehn, Tilman
2016-03-01
We present a complete phenomenological prospectus for thermal relic neutralinos. Including Sommerfeld enhancements to relic abundance and halo annihilation calculations, we obtain direct, indirect, and collider discovery prospects for all neutralinos with mass parameters M1 , M2 , |μ |<4 TeV , which freeze out to the observed dark matter abundance, with scalar superpartners decoupled. Much of the relic neutralino sector will be uncovered by the direct detection experiments Xenon1T and LZ, as well as indirect detection with Cerenkov Telescope Array. We emphasize that thermal relic Higgsinos will be found by next-generation direct detection experiments, so long as M1 ,2<4 TeV . Charged tracks at a 100 TeV hadron collider complement indirect searches for relic winos. Thermal relic bino-winos still evade all planned experiments, including disappearing charged-track searches. However, they can be discovered by compressed electroweakino searches at a 100 TeV collider, completing the full coverage of the relic neutralino surface.
Increased Chain Length Promotes Pneumococcal Adherence and Colonization
Rodriguez, Jesse L.; Dalia, Ankur B.
2012-01-01
Streptococcus pneumoniae is a mucosal pathogen that grows in chains of variable lengths. Short-chain forms are less likely to activate complement, and as a consequence they evade opsonophagocytic clearance more effectively during invasive disease. When grown in human nasal airway surface fluid, pneumococci exhibited both short- and long-chain forms. Here, we determined whether longer chains provide an advantage during colonization when the organism is attached to the epithelial surface. Chain-forming mutants and the parental strain grown under conditions to promote chain formation showed increased adherence to human epithelial cells (A549 cells) in vitro. Additionally, adherence to A549 cells selected for longer chains within the wild-type strain. In vivo in a murine model of colonization, chain-forming mutants outcompeted the parental strain. Together, our results demonstrate that morphological heterogeneity in the pneumococcus may promote colonization of the upper respiratory tract by enhancing the ability of the organism to bind to the epithelial surface. PMID:22825449
Towards the final word on neutralino dark matter
Bramante, Joseph; Desai, Nishita; Fox, Patrick; ...
2016-03-25
We present a complete phenomenological prospectus for thermal relic neutralinos. Including Sommerfeld enhancements to relic abundance and halo annihilation calculations, we obtain direct, indirect, and collider discovery prospects for all neutralinos with mass parametersmore » $$M_1,M_2,|\\mu| < 4$$ TeV, that freeze out to the observed dark matter abundance, with scalar superpartners decoupled. Much of the relic neutralino sector will be uncovered by the direct detection experiments Xenon1T and LZ, as well as indirect detection with CTA. We emphasize that thermal relic higgsinos will be found by next-generation direct detection experiments, so long as $$M_{1,2} < 4$$ TeV. Charged tracks at a 100 TeV hadron collider complement indirect searches for relic winos. Thermal relic bino-winos still evade all planned experiments, including disappearing charged-track searches. Furthermore, they can be discovered by compressed electroweakino searches at a 100 TeV collider, completing the full coverage of the relic neutralino surface.« less
Wangdi, Tamding; Lee, Cheng-Yuk; Spees, Alanna M.; Yu, Chenzhou; Kingsbury, Dawn D.; Winter, Sebastian E.; Hastey, Christine J.; Wilson, R. Paul
2014-01-01
Salmonella enterica serovar Typhi (S. Typhi) causes typhoid fever, a disseminated infection, while the closely related pathogen S. enterica serovar Typhimurium (S. Typhimurium) is associated with a localized gastroenteritis in humans. Here we investigated whether both pathogens differ in the chemotactic response they induce in neutrophils using a single-cell experimental approach. Surprisingly, neutrophils extended chemotactic pseudopodia toward Escherichia coli and S. Typhimurium, but not toward S. Typhi. Bacterial-guided chemotaxis was dependent on the presence of complement component 5a (C5a) and C5a receptor (C5aR). Deletion of S. Typhi capsule biosynthesis genes markedly enhanced the chemotactic response of neutrophils in vitro. Furthermore, deletion of capsule biosynthesis genes heightened the association of S. Typhi with neutrophils in vivo through a C5aR-dependent mechanism. Collectively, these data suggest that expression of the virulence-associated (Vi) capsular polysaccharide of S. Typhi obstructs bacterial-guided neutrophil chemotaxis. PMID:25101794
Gan, Zhen; Wang, Bei; Zhou, Wei; Lu, Yishan; Zhu, Weiwei; Tang, Jufen; Jian, JiChang; Wu, Zaohe
2015-05-01
CD59, the major inhibitor of membrane attack complex, plays a crucial role in regulation of complement activation. In this paper, a CD59 gene of Nile tilapia, Oreochromis niloticus (designated as On-CD59) was cloned and its expression pattern under the stimulation of Streptococcus agalactiae was investigated. Sequence analysis showed main structural features required for complement-inhibitory activity were detected in the deduced amino acid sequence of On-CD59. In healthy Nile tilapia, the On-CD59 transcripts could be detected in all the examined tissues, with the most abundant expression in the brain. When immunized with inactivated S. agalactiae, there was a clear time-dependent expression pattern of On-CD59 in the skin, brain, head kidney, thymus and spleen, with quite different kinetic expressions. The assays for the complement-inhibitory activity suggested that recombinant On-CD59 protein had a species-selective inhibition of complement. Moreover, our works showed that recombinant On-CD59 protein may possess both binding activities to PGN and LTA and inhibiting activity of S. agalactiae. These findings indicated that On-CD59 may play important roles in the immune response to S. agalactiae in Nile tilapia. Copyright © 2015 Elsevier Ltd. All rights reserved.
[Undiagnosed hereditary angioedema in a patient undergoing emergency caesarean section].
Tomita, Yukihiko; Kamei, Masataka; Jyujou, Satoshi; Horiuchi, Chinami; Katsuragi, Shinji; Onishi, Yoshihiko
2012-12-01
Hereditary angioedema (HAE) is characterized by acute, recurrent attacks of localized edema. Surgical procedures, trauma, and infections have been considered as potential triggers of HAE. Although HAE is a rare genetic disorder, approximately 50-60% of all HAE patients are involved with at least one occurrence of upper airway obstruction. The airway trouble is the most life-threating complication in HAE patients because HAE-related edema does not respond to typical treatment, such as administration of epinephrine, antihistamines, or glucocorticoids. Indeed, mortality rates of laryngeal attack are estimated around 25% to 40%. Here we describe a case of undiagnosed HAE patient undergoing emergency caesarean section under neuraxial blockade. A 31-year-old woman showed multiple regions at her lip margin during surgery and rapidly developed lip swelling after admission to the ward. Neither respiratory nor hemodynamic instability was found during and after surgery. Immediately, in order to assess whether HAE caused these dermatological manifestations, we measured values of both complement component 4 (C4) and functional activity of C1-esterase inhibitor (C1-inh), a protein of the complement system. These laboratory data showed low levels, which were compatible with HAE definition. After commencement of C1-inhibitor replacement therapy, her lip swelling and erythema gradually disappeared without adverse drug reactions. The patient was finally discharged from our institution 10 days after surgery.
A Common Fold Mediates Vertebrate Defense and Bacterial Attack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosado, Carlos J.; Buckle, Ashley M.; Law, Ruby H.P.
2008-10-02
Proteins containing membrane attack complex/perforin (MACPF) domains play important roles in vertebrate immunity, embryonic development, and neural-cell migration. In vertebrates, the ninth component of complement and perforin form oligomeric pores that lyse bacteria and kill virus-infected cells, respectively. However, the mechanism of MACPF function is unknown. We determined the crystal structure of a bacterial MACPF protein, Plu-MACPF from Photorhabdus luminescens, to 2.0 angstrom resolution. The MACPF domain reveals structural similarity with poreforming cholesterol-dependent cytolysins (CDCs) from Gram-positive bacteria. This suggests that lytic MACPF proteins may use a CDC-like mechanism to form pores and disrupt cell membranes. Sequence similarity between bacterialmore » and vertebrate MACPF domains suggests that the fold of the CDCs, a family of proteins important for bacterial pathogenesis, is probably used by vertebrates for defense against infection.« less
Toropainen, Maija; Saarinen, Leena; Vidarsson, Gestur; Käyhty, Helena
2006-05-01
The relative contributions of antibody-induced complement-mediated bacterial lysis and antibody/complement-mediated phagocytosis to host immunity against meningococcal infections are currently unclear. Further, the in vivo effector functions of antibodies may vary depending on their specificity and Fc heavy-chain isotype. In this study, a mouse immunoglobulin G2a (mIgG2a) monoclonal antibody (MN12H2) to meningococcal outer membrane protein PorA (P1.16), its human IgG subclass derivatives (hIgG1 to hIgG4), and an mIgG2a monoclonal antibody (Nmb735) to serogroup B capsular polysaccharide (B-PS) were evaluated for passive protection against meningococcal serogroup B strain 44/76-SL (B:15:P1.7,16) in an infant rat infection model. Complement component C6-deficient (PVG/c-) rats were used to assess the importance of complement-mediated bacterial lysis for protection. The PorA-specific parental mIgG2a and the hIgG1 to hIgG3 derivatives all induced efficient bactericidal activity in vitro in the presence of human or infant rat complement and augmented bacterial clearance in complement-sufficient HsdBrlHan:WIST rats, while the hIgG4 was unable to do so. In C6-deficient PVG/c- rats, lacking complement-mediated bacterial lysis, the augmentation of bacterial clearance by PorA-specific mIgG2a and hIgG1 antibodies was impaired compared to that in the syngeneic complement-sufficient PVG/c+ rat strain. This was in contrast to the case for B-PS-specific mIgG2a, which conferred similar protective activity in both rat strains. These data suggest that while anti-B-PS antibody can provide protection in the infant rats without membrane attack complex formation, the protection afforded by anti-PorA antibody is more dependent on the activation of the whole complement pathway and subsequent bacterial lysis.
Merkel, Alexandra B; Major, Louise L; Errey, James C; Burkart, Michael D; Field, Robert A; Walsh, Christopher T; Naismith, James H
2004-07-30
Vancomycin, the last line of defense antibiotic, depends upon the attachment of the carbohydrate vancosamine to an aglycone skeleton for antibacterial activity. Vancomycin is a naturally occurring secondary metabolite that can be produced by bacterial fermentation. To combat emerging resistance, it has been proposed to genetically engineer bacteria to produce analogues of vancomycin. This requires a detailed understanding of the biochemical steps in the synthesis of vancomycin. Here we report the 1.4 A structure and biochemical characterization of EvaD, an RmlC-like protein that is required for the C-5' epimerization during synthesis of dTDP-epivancosamine. EvaD, although clearly belonging to the RmlC class of enzymes, displays very low activity in the archetypal RmlC reaction (double epimerization of dTDP-6-deoxy-4-keto-D-glucose at C-3' and C-5'). The high resolution structure of EvaD compared with the structures of authentic RmlC enzymes indicates that a subtle change in the enzyme active site repositions a key catalytic Tyr residue. A mutant designed to re-establish the normal position of the Tyr increases the RmlC-like activity of EvaD.
Trichinella spiralis Calreticulin Binds Human Complement C1q As an Immune Evasion Strategy.
Zhao, Limei; Shao, Shuai; Chen, Yi; Sun, Ximeng; Sun, Ran; Huang, Jingjing; Zhan, Bin; Zhu, Xinping
2017-01-01
As a multicellular parasitic nematode, Trichinella spiralis regulates host immune responses by producing a variety of immunomodulatory molecules to escape from host immune attack, but the mechanisms underlying the immune evasion are not well understood. Here, we identified that T. spiralis calreticulin ( Ts -CRT), a Ca 2+ -binding protein, facilitated T. spiralis immune evasion by interacting with the first component of human classical complement pathway, C1q. In the present study, Ts -CRT was found to be expressed on the surface of different developmental stages of T. spiralis as well as in the secreted products of adult and muscle larval worms. Functional analysis identified that Ts -CRT was able to bind to human C1q, resulting in the inhibition of C1q-initiated complement classical activation pathway reflected by reduced C4/C3 generation and C1q-dependent lysis of antibody-sensitized sheep erythrocytes. Moreover, recombinant Ts -CRT (r Ts -CRT) binding to C1q suppressed C1q-induced THP-1-derived macrophages chemotaxis and reduced monocyte-macrophages release of reactive oxygen intermediates (ROIs). Blocking Ts -CRT on the surface of newborn larvae (NBL) of T. spiralis with anti- Ts -CRT antibody increased the C1q-mediated adherence of monocyte-macrophages to larvae and impaired larval infectivity. All of these results suggest that T. spiralis -expressed Ts -CRT plays crucial roles in T. spiralis immune evasion and survival in host mostly by directly binding to host complement C1q, which not only reduces C1q-mediated activation of classical complement pathway but also inhibits the C1q-induced non-complement activation of macrophages.
Trichinella spiralis Calreticulin Binds Human Complement C1q As an Immune Evasion Strategy
Zhao, Limei; Shao, Shuai; Chen, Yi; Sun, Ximeng; Sun, Ran; Huang, Jingjing; Zhan, Bin; Zhu, Xinping
2017-01-01
As a multicellular parasitic nematode, Trichinella spiralis regulates host immune responses by producing a variety of immunomodulatory molecules to escape from host immune attack, but the mechanisms underlying the immune evasion are not well understood. Here, we identified that T. spiralis calreticulin (Ts-CRT), a Ca2+-binding protein, facilitated T. spiralis immune evasion by interacting with the first component of human classical complement pathway, C1q. In the present study, Ts-CRT was found to be expressed on the surface of different developmental stages of T. spiralis as well as in the secreted products of adult and muscle larval worms. Functional analysis identified that Ts-CRT was able to bind to human C1q, resulting in the inhibition of C1q-initiated complement classical activation pathway reflected by reduced C4/C3 generation and C1q-dependent lysis of antibody-sensitized sheep erythrocytes. Moreover, recombinant Ts-CRT (rTs-CRT) binding to C1q suppressed C1q-induced THP-1-derived macrophages chemotaxis and reduced monocyte–macrophages release of reactive oxygen intermediates (ROIs). Blocking Ts-CRT on the surface of newborn larvae (NBL) of T. spiralis with anti-Ts-CRT antibody increased the C1q-mediated adherence of monocyte–macrophages to larvae and impaired larval infectivity. All of these results suggest that T. spiralis-expressed Ts-CRT plays crucial roles in T. spiralis immune evasion and survival in host mostly by directly binding to host complement C1q, which not only reduces C1q-mediated activation of classical complement pathway but also inhibits the C1q-induced non-complement activation of macrophages. PMID:28620388
HARRIS, C L; WILLIAMS, A S; LINTON, S M; MORGAN, B P
2002-01-01
Complement activation and subsequent generation of inflammatory molecules and membrane attack complex contributes to the pathology of a number of inflammatory and degenerative diseases, including arthritis, glomerulonephritis and demyelination. Agents that specifically inhibit complement activation might prove beneficial in the treatment of these diseases. Soluble recombinant forms of the naturally occurring membrane complement regulatory proteins (CRP) have been exploited for this purpose. We have undertaken to design better therapeutics based on CRP. Here we describe the generation of soluble, recombinant CRP comprising rat decay accelerating factor (DAF) or rat CD59 expressed as Fc fusion proteins, antibody-like molecules comprising two CRP moieties in place of the antibody Fab arms (CRP-Ig). Reagents bearing DAF on each arm (DAF-Ig), CD59 on each arm (CD59-Ig) and a hybrid reagent containing both DAF and CD59 were generated. All three reagents inhibited C activation in vitro. Compared with soluble CRP lacking Fc domains, activity was reduced, but was fully restored by enzymatic release of the regulator from the Ig moiety, implicating steric constraints in reducing functional activity. In vivo studies showed that DAF-Ig, when compared to soluble DAF, had a much extended half-life in the circulation in rats and concomitantly caused a sustained reduction in plasma complement activity. When given intra-articularly to rats in a model of arthritis, DAF-Ig significantly reduced severity of disease. The data demonstrate the potential of CRP-Ig as reagents for sustained therapy of inflammatory disorders, including arthritis, but emphasize the need for careful design of fusion proteins to retain function. PMID:12165074
Clinical roundtable monograph: Paroxysmal nocturnal hemoglobinuria: a case-based discussion.
Szer, Jeff; Hill, Anita; Weitz, Ilene Ceil
2012-11-01
Paroxysmal nocturnal hemoglobinuria (PNH) is a rare, acquired disorder characterized by chronic intravascular hemolysis as the primary clinical manifestation and morbidities that include anemia, thrombosis, renal impairment, pulmonary hypertension, and bone marrow failure. The prevalence of the PNH clone (from <1-100% PNH granulocytes) is approximately 16 per million, and careful monitoring is required. The average age of onset of the clinical disease is the early 30s, although it can present at all ages. PNH is caused by the acquisition of a somatic mutation of the gene phosphatidylinositol glycan anchor (PIG-A) in a multipotent hematopoietic stem cell (HSC), with clonal expansion of the mutated HSC. The mutation causes a deficiency in the synthesis of glycosylphosphatidylinositol (GPI). In cells derived from normal HSCs, the complement regulatory proteins CD55 and CD59 are anchored to the hematopoietic cell membrane surface via GPI, protecting the cells from complement-mediated lysis. However, in patients with PNH, these 2 proteins, along with numerous other GPI-linked proteins, are absent from the cell surface of red cells, granulocytes, monocytes, and platelets, resulting in complement-mediated intravascular hemolysis and other complications. Lysis of red blood cells is the most obvious manifestation, but as other cell lineages are also affected, this complement-mediated attack contributes to additional complications, such as thrombosis. Eculizumab, a humanized monoclonal antibody against the C5 complement protein, is the only effective drug therapy for PNH patients. The antibody prevents cleavage of the C5 protein by C5 convertase, in turn preventing generation of C5b-9 and release of C5a, thereby protecting from hemolysis of cells lacking the CD59 surface protein and other complications associated with complement activation. Drs. Ilene C. Weitz, Anita Hill, and Jeff Szer discuss 3 recent cases of patients with PNH.
[Pharmacological properties of law-evading chemical substances].
Funada, Masahiko
2015-09-01
In recent years, frequent cases of people suffering disturbed consciousness, dyspnea, etc. due to abuse of synthetic cannabis and being transported by ambulance or causing traffic accidents are occurring and are becoming a serious social problem in Japan. Most law-evading herbal products have colorful illustrations and logos and are sold as incense or herbs. Law-evading herbal products consist of finely chopped dry vegetative matter mixed with chemical substances (drugs), and the drugs are injurious to health. Analysis of chemical substances in herbal products clarified that they contain synthetic cannabinoid, a chemical component that exhibits action similar to that of hemp. There are many affinity compounds of cannabinoid, so presently, even if a particular drug is regulated, similar compounds that partially differ in structure will propagate. There is thus a cat-and-mouse game between regulations on chemical substances and their propagation. This paper summarizes the pharmacological actions and danger of chemical substances contained in law-evading herbal products by focusing on synthetic cannabinoid or synthetic cathinone, a chemical substance it contains.
Targeting the Human Complement Membrane Attack Complex to Selectively Kill Prostate Cancer Cells
2012-10-01
prostate cancer cells in vitro . Evaluate CD59 expression in human prostate cancer microarrays. Aim 4: Evaluate toxicity and efficacy of the lead...findings suggest PSA may also have immunoregulatory activity in the seminal plasma to aid in normal fertility that may have been co-opted by prostate...cleavage fragments have not been described. PSA can cleave C3 and generate the 37 kDa fragment in vitro . PSA is the major chymotrypsin-like serine
Targeting the Human Complement Membrane Attack Complex to Selectively Kill Prostate Cancer Cells
2014-12-01
These mutants will be tested for their specificity and potency against PSA positive/negative cells in conjunction with the PSMA binding urea...targeting studies. Second, to achieve cell binding and uptake, we propose to link a PSMA binding urea to the C-terminus of recombinant GZMB. This will be...will be linked to the free amine of the PSMA urea in order to covalently link the compound to the C- terminus of GZMB. The C-terminus was chosen
Afroz, S; Roy, D K; Khan, A H
2013-04-01
Low serum level of IgG, complement C3 and C4 in nephrotic syndrome children may cause increased susceptibility to infection. Serum level of IgG and complements in nephrotic children (NS) with UTI has been analyzed in this cross sectional study. It was carried out in the department of Pediatric nephrology, National Institute of Kidney Diseases & Urology (NIKDU), Dhaka, Bangladesh. The study subjects were followed up prospectively for one year to see and compare the frequency of relapse of NS and UTI. Patients were selected in a nonrandom purposive technique. Nephrotic syndrome children with initial attack between 1-12 year of age were included over a period of one year. The patients were grouped into Group I - UTI positive and Group II - UTI negative depending on urine culture positivity and colony count >10⁵ CFU/ml. Serum IgG and complements C3, C4 levels were done in both groups during nephrosis and were compared. A total of 101 children M: F 1.7:1, mean age 5.96±3.2 years were included in this study. Group I, n=45 vs. Group II, n=56. The mean serum level of IgG was low in Group I (549.91±210.71 vs. 728.64±235.81mg/dl, p<0.001). Serum IgG level less than 700mg/dl was found in 37 vs. 23 children {x² (¹) 17.52 p<0.001, OR=6.63}. Mean serum complement C3 level was also low in Group I (123.09±40.52 vs. 143.38±37.06mg/dl, p<0.05). But complement C3 and C4 level do not carry any risk of developing UTI in nephrotic children. Higher number of children in Group II were at remission (n=24) during follow up, while frequent relapsers were high in Group I (n=22). Increased frequency of UTI attack (88 episodes) was found in Group I children compared to none in Group II during follow up. So low serum level of IgG in children with NS during nephrosis can predict UTI with an odds ratio of 6.63 as well as relapse. Serum level of C3, C4 do not associated with any risk of development of UTI in NS children.
75 FR 842 - Action Affecting Export Privileges: Hailin Lin
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Action Affecting Export Privileges: Hailin... Regulations. Charges 112-12415: CFR 764.2(h)--Taking Action With Intent To Evade the Regulations In connection... through on or about September 30, 2004, Lin took actions with intent to evade the provisions of the...
75 FR 337 - Action Affecting Export Privileges: Ning Wen
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... DEPARTMENT OF COMMERCE Bureau of Industry and Security [07-BIS-02] Action Affecting Export.... Charges 112-124: 15 CFR 764.2(h)--Taking Action With Intent To Evade the Regulations In connection with... or about September 30, 2004, Wen took actions with intent to evade the provisions of the Regulations...
McIntyre, Jenifer K.; Baldwin, David H.; Beauchamp, David A.; Scholz, Nathaniel L.
2012-01-01
Copper contamination in surface waters is common in watersheds with mining activities or agricultural, industrial, commercial, and residential human land uses. This widespread pollutant is neurotoxic to the chemosensory systems of fish and other aquatic species. Among Pacific salmonids (), copper-induced olfactory impairment has previously been shown to disrupt behaviors reliant on a functioning sense of smell. For juvenile coho salmon (O. kisutch), this includes predator avoidance behaviors triggered by a chemical alarm cue (conspecific skin extract). However, the survival consequences of this sublethal neurobehavioral toxicity have not been explored. In the present study juvenile coho were exposed to low levels of dissolved copper (5–20 μg/L for 3 h) and then presented with cues signaling the proximity of a predator. Unexposed coho showed a sharp reduction in swimming activity in response to both conspecific skin extract and the upstream presence of a cutthroat trout predator (O. clarki clarki) previously fed juvenile coho. This alarm response was absent in prey fish that were exposed to copper. Moreover, cutthroat trout were more effective predators on copper-exposed coho during predation trials, as measured by attack latency, survival time, and capture success rate. The shift in predator–prey dynamics was similar when predators and prey were co-exposed to copper. Overall, we show that copper-exposed coho are unresponsive to their chemosensory environment, unprepared to evade nearby predators, and significantly less likely to survive an attack sequence. Our findings contribute to a growing understanding of how common environmental contaminants alter the chemical ecology of aquatic communities.
The Bacteroides fragilis cell envelope: quarterback, linebacker, coach-or all three?
Pumbwe, Lilian; Skilbeck, Christopher A; Wexler, Hannah M
2006-01-01
Bacteroides fragilis is an anaerobic commensal constituting only 1-2% of the micro-flora of the human gastrointestinal tract, yet it is the predominant anaerobic isolate in cases of intraabdominal sepsis and bacteremia. B. fragilis can play two roles in the host: in its role as friendly commensal, it must be able to establish itself in the host intestinal mucosa, to utilize and process polysaccharides for use by the host, and to resist the noxious effects of bile salts. In its role as pathogen, it must be able to attach itself to the site of infection, evade killing mechanisms by host defense, withstand antimicrobial treatment and produce factors that damage host tissue. The cell envelope of B. fragilis, likewise, must be able to function in the roles of aggressor, defender and strategist in allowing the organism to establish itself in the host--whether as friend or foe. Recent studies of the genomes and proteomes of the genus Bacteroides suggest that these organisms have evolved strategies to survive and dominate in the overcrowded gastrointestinal neighborhood. Analysis of the proteomes of B. fragilis and Bacteroides thetaiotaomicron demonstrates both a tremendous capacity to use a wide range of dietary polysaccharides, and the capacity to create variable surface antigenicities by multiple DNA inversion systems. The latter characteristic is particularly pronounced in the species B. fragilis, which is more frequently found at the mucosal surface (i.e., often the site of attack by host defenses). The B. fragilis cell envelope undergoes major protein expression and ultrastructural changes in response to stressors such as bile or antimicrobial agents. These agents may also act as signals for attachment and colonization. Thus the bacterium manages its surface characteristics to enable it to bind to its target, to use the available nutrients, and to avoid or evade hostile forces (host-derived or external) in its multiple roles.
Aybar, Lydia; Shin, Dong-Ho; Smith, Sylvia L.
2009-01-01
Target cell lysis by complement is achieved by the assembly and insertion of the membrane attack complex (MAC) composed of glycoproteins C5b through C9. The lytic activity of shark complement involves functional analogues of mammalian C8 and C9. Mammalian C8 is composed of α, β, and γ subunits. The subunit structure of shark C8 is not known. This report describes a 2341 nucleotide sequence that translates into a polypeptide of 589 amino acid residues, orthologue to mammalian C8α and has the same modular architecture with conserved cysteines forming the peptide bond backbone. The C8γ-binding cysteine is conserved in the perforin-like domain. Hydrophobicity profile indicates the presence of hydrophobic residues essential for membrane insertion. It shares 41.1% and 47.4 % identity with human and Xenopus C8α respectively. Southern blot analysis showed GcC8α exists as a single copy gene expressed in most tissues except the spleen with the liver being the main site of synthesis. Phylogenetic analysis places it in a clade with C8α orthologs and as a sister taxa to the Xenopus. PMID:19524681
Current progress in the development of a prophylactic vaccine for HIV-1
Gamble, Lena J; Matthews, Qiana L
2011-01-01
Since its discovery and characterization in the early 1980s as a virus that attacks the immune system, there has been some success for the treatment of human immunodeficiency virus-1 (HIV-1) infection. However, due to the overwhelming public health impact of this virus, a vaccine is needed urgently. Despite the tireless efforts of scientist and clinicians, there is still no safe and effective vaccine that provides sterilizing immunity. A vaccine that provides sterilizing immunity against HIV infection remains elusive in part due to the following reasons: 1) degree of diversity of the virus, 2) ability of the virus to evade the hosts’ immunity, and 3) lack of appropriate animal models in which to test vaccine candidates. There have been several attempts to stimulate the immune system to provide protection against HIV-infection. Here, we will discuss attempts that have been made to induce sterilizing immunity, including traditional vaccination attempts, induction of broadly neutralizing antibody production, DNA vaccines, and use of viral vectors. Some of these attempts show promise pending continued research efforts. PMID:21267356
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moldoveanu, Tudor; Gehring, Kalle; Green, Douglas R.
2009-01-15
Ca{sup 2+}-dependent cysteine proteases, calpains, regulate cell migration, cell death, insulin secretion, synaptic function and muscle homeostasis. Their endogenous inhibitor, calpastatin, consists of four inhibitory repeats, each of which neutralizes an activated calpain with exquisite specificity and potency. Despite the physiological importance of this interaction, the structural basis of calpain inhibition by calpastatin is unknown. Here we report the 3.0 A structure of Ca{sup 2+}-bound m-calpain in complex with the first calpastatin repeat, both from rat, revealing the mechanism of exclusive specificity. The structure highlights the complexity of calpain activation by Ca{sup 2+}, illustrating key residues in a peripheral domainmore » that serve to stabilize the protease core on Ca{sup 2+} binding. Fully activated calpain binds ten Ca{sup 2+} atoms, resulting in several conformational changes allowing recognition by calpastatin. Calpain inhibition is mediated by the intimate contact with three critical regions of calpastatin. Two regions target the penta-EF-hand domains of calpain and the third occupies the substrate-binding cleft, projecting a loop around the active site thiol to evade proteolysis.« less
Risko, Casey B.; Rayes, Diana; Albaik, Ahmad; Alnajar, Mohammed; Kewara, Mazen; Baker, Elise; Rubenstein, Leonard S.
2018-01-01
Background Violent attacks on and interferences with hospitals, ambulances, health workers, and patients during conflict destroy vital health services during a time when they are most needed and undermine the long-term capacity of the health system. In Syria, such attacks have been frequent and intense and represent grave violations of the Geneva Conventions, but the number reported has varied considerably. A systematic mechanism to document these attacks could assist in designing more protection strategies and play a critical role in influencing policy, promoting justice, and addressing the health needs of the population. Methods and findings We developed a mobile data collection questionnaire to collect data on incidents of attacks on healthcare directly from the field. Data collectors from the Syrian American Medical Society (SAMS), using the tool or a text messaging system, recorded information on incidents across four of Syria’s northern governorates (Aleppo, Idleb, Hama, and Homs) from January 1, 2016, to December 31, 2016. SAMS recorded a total of 200 attacks on healthcare in 2016, 102 of them using the mobile data collection tool. Direct attacks on health facilities comprised the majority of attacks recorded (88.0%; n = 176). One hundred and twelve healthcare staff and 185 patients were killed in these incidents. Thirty-five percent of the facilities were attacked more than once over the data collection period; hospitals were significantly more likely to be attacked more than once compared to clinics and other types of healthcare facilities. Aerial bombs were used in the overwhelming majority of cases (91.5%). We also compared the SAMS data to a separate database developed by Physicians for Human Rights (PHR) based on media reports and matched the incidents to compare the results from the two methods (this analysis was limited to incidents at health facilities). Among 90 relevant incidents verified by PHR and 177 by SAMS, there were 60 that could be matched to each other, highlighting the differences in results from the two methods. This study is limited by the complexities of data collection in a conflict setting, only partial use of the standardized reporting tool, and the fact that limited accessibility of some health facilities and workers and may be biased towards the reporting of attacks on larger or more visible health facilities. Conclusions The use of field data collectors and use of consistent definitions can play an important role in the tracking incidents of attacks on health services. A mobile systematic data collection tool can complement other methods for tracking incidents of attacks on healthcare and ensure the collection of detailed information about each attack that may assist in better advocacy, programs, and accountability but can be practically challenging. Comparing attacks between SAMS and PHR suggests that there may have been significantly more attacks than previously captured by any one methodology. This scale of attacks suggests that targeting of healthcare in Syria is systematic and highlights the failure of condemnation by the international community and medical groups working in Syria of such attacks to stop them. PMID:29689085
Pathogenesis and Pathophysiology of Pneumococcal Meningitis
Mook-Kanamori, Barry B.; Geldhoff, Madelijn; van der Poll, Tom; van de Beek, Diederik
2011-01-01
Summary: Pneumococcal meningitis continues to be associated with high rates of mortality and long-term neurological sequelae. The most common route of infection starts by nasopharyngeal colonization by Streptococcus pneumoniae, which must avoid mucosal entrapment and evade the host immune system after local activation. During invasive disease, pneumococcal epithelial adhesion is followed by bloodstream invasion and activation of the complement and coagulation systems. The release of inflammatory mediators facilitates pneumococcal crossing of the blood-brain barrier into the brain, where the bacteria multiply freely and trigger activation of circulating antigen-presenting cells and resident microglial cells. The resulting massive inflammation leads to further neutrophil recruitment and inflammation, resulting in the well-known features of bacterial meningitis, including cerebrospinal fluid pleocytosis, cochlear damage, cerebral edema, hydrocephalus, and cerebrovascular complications. Experimental animal models continue to further our understanding of the pathophysiology of pneumococcal meningitis and provide the platform for the development of new adjuvant treatments and antimicrobial therapy. This review discusses the most recent views on the pathophysiology of pneumococcal meningitis, as well as potential targets for (adjunctive) therapy. PMID:21734248
Towards Identifying Protective B-Cell Epitopes: The PspA Story.
Khan, Naeem; Jan, Arif T
2017-01-01
Pneumococcal surface protein A (PspA) is one of the most abundant cell surface protein of Streptococcus pneumoniae ( S. pneumoniae ). PspA variants are structurally and serologically diverse and help evade complement-mediated phagocytosis of S. pneumoniae , which is essential for its survival in the host. PspA is currently been screened for employment in the generation of more effective (serotype independent) vaccine to overcome the limitations of polysaccharide based vaccines, providing serotype specific immune responses. The cross-protection eliciting regions of PspA localize to the α-helical and proline rich regions. Recent data indicate significant variation in the ability of antibodies induced against the recombinant PspA variants to recognize distinct S. pneumoniae strains. Hence, screening for the identification of the topographical repertoire of B-cell epitopes that elicit cross-protective immune response seems essential in the engineering of a superior PspA-based vaccine. Herein, we revisit epitope identification in PspA and the utility of hybridoma technology in directing the identification of protective epitope regions of PspA that can be used in vaccine research.
Dynamics of tax evasion through an epidemic-like model
NASA Astrophysics Data System (ADS)
Brum, Rafael M.; Crokidakis, Nuno
In this work, we study a model of tax evasion. We considered a fixed population divided in three compartments, namely honest tax payers, tax evaders and a third class between the mentioned two, which we call susceptibles to become evaders. The transitions among those compartments are ruled by probabilities, similarly to a model of epidemic spreading. These probabilities model social interactions among the individuals, as well as the government’s fiscalization. We simulate the model on fully-connected graphs, as well as on scale-free and random complex networks. For the fully-connected and random graph cases, we observe that the emergence of tax evaders in the population is associated with an active-absorbing nonequilibrium phase transition, that is absent in scale-free networks.
NASA Technical Reports Server (NTRS)
Neiner, G. H.; Dustin, M. O.; Cole, G. L.
1979-01-01
A stability-bleed system was installed in a YF-12 flight inlet that was subjected to internal and external airflow disturbances in the NASA Lewis 10 by 10 foot supersonic wind tunnel. The purpose of the system is to allow higher inlet performance while maintaining a substantial tolerance (without unstart) to internal and external disturbances. At Mach numbers of 2.47 and 2.76, the inlet tolerance to decreases in diffuser-exit corrected airflow was increased by approximately 10 percent of the operating-point airflow. The stability-bleed system complemented the terminal-shock-control system of the inlet and did not show interaction problems. For disturbances which caused a combined decrease in Mach number and increase in angle of attack, the system with valves operative kept the inlet started 4 to 28 times longer than with the valves inoperative. Hence, the stability system provides additional time for the inlet control system to react and prevent unstart. This was observed for initial Mach numbers of 2.55 and 2.68. For slow increase in angle of attack at Mach 2.47 and 2.76, the system kept the inlet started beyond the steady-state unstart angle. However, the maximum transient angles of attack without unstart could not be determined because wind-tunnel mechanical-stop limits for angle of attack were reached.
Targeting C-reactive protein for the treatment of cardiovascular disease
NASA Astrophysics Data System (ADS)
Pepys, Mark B.; Hirschfield, Gideon M.; Tennent, Glenys A.; Ruth Gallimore, J.; Kahan, Melvyn C.; Bellotti, Vittorio; Hawkins, Philip N.; Myers, Rebecca M.; Smith, Martin D.; Polara, Alessandra; Cobb, Alexander J. A.; Ley, Steven V.; Andrew Aquilina, J.; Robinson, Carol V.; Sharif, Isam; Gray, Gillian A.; Sabin, Caroline A.; Jenvey, Michelle C.; Kolstoe, Simon E.; Thompson, Darren; Wood, Stephen P.
2006-04-01
Complement-mediated inflammation exacerbates the tissue injury of ischaemic necrosis in heart attacks and strokes, the most common causes of death in developed countries. Large infarct size increases immediate morbidity and mortality and, in survivors of the acute event, larger non-functional scars adversely affect long-term prognosis. There is thus an important unmet medical need for new cardioprotective and neuroprotective treatments. We have previously shown that human C-reactive protein (CRP), the classical acute-phase protein that binds to ligands exposed in damaged tissue and then activates complement, increases myocardial and cerebral infarct size in rats subjected to coronary or cerebral artery ligation, respectively. Rat CRP does not activate rat complement, whereas human CRP activates both rat and human complement. Administration of human CRP to rats is thus an excellent model for the actions of endogenous human CRP. Here we report the design, synthesis and efficacy of 1,6-bis(phosphocholine)-hexane as a specific small-molecule inhibitor of CRP. Five molecules of this palindromic compound are bound by two pentameric CRP molecules, crosslinking and occluding the ligand-binding B-face of CRP and blocking its functions. Administration of 1,6-bis(phosphocholine)-hexane to rats undergoing acute myocardial infarction abrogated the increase in infarct size and cardiac dysfunction produced by injection of human CRP. Therapeutic inhibition of CRP is thus a promising new approach to cardioprotection in acute myocardial infarction, and may also provide neuroprotection in stroke. Potential wider applications include other inflammatory, infective and tissue-damaging conditions characterized by increased CRP production, in which binding of CRP to exposed ligands in damaged cells may lead to complement-mediated exacerbation of tissue injury.
Wu, You-Qiang; Qu, Hongchang; Sfyroera, Georgia; Tzekou, Apostolia; Kay, Brian K.; Nilsson, Bo; Ekdahl, Kristina Nilsson; Ricklin, Daniel; Lambris, John D.
2011-01-01
Exposure of nonself surfaces such as those of biomaterials or transplanted cells and organs to host blood frequently triggers innate immune responses, thereby affecting both their functionality and tolerability. Activation of the alternative pathway of complement plays a decisive role in this unfavorable reaction. Whereas previous studies demonstrated that immobilization of physiological regulators of complement activation (RCA) can attenuate this foreign body-induced activation, simple and efficient approaches for coating artificial surfaces with intact RCA are still missing. The conjugation of small molecular entities that capture RCA with high affinity is an intriguing alternative, as this creates a surface with autoregulatory activity upon exposure to blood. We therefore screened two variable cysteine-constrained phage-displayed peptide libraries for factor H-binding peptides. We discovered three peptide classes that differed with respect to their main target binding areas. Peptides binding to the broad middle region of factor H (domains 5–18) were of particular interest, as they do not interfere with either regulatory or binding activities. One peptide in this group (5C6) was further characterized and showed high factor H-capturing activity while retaining its functional integrity. Most importantly, when 5C6 was coated to a model polystyrene surface and exposed to human lepirudin-anticoagulated plasma, the bound peptide captured factor H and substantially inhibited complement activation by the alternative pathway. Our study therefore provides a promising and novel approach to produce therapeutic materials with enhanced biocompatibility. PMID:21339361
Funada, Masahiko
2016-01-01
Cases of people experiencing disturbed consciousness or dyspnea, causing traffic accidents, or requiring ambulance transport to hospital due to abuse of law-evading chemical substances have become a serious social problem in Japan. Most law-evading herbal products are marketed as incense or herbs and consist of finely chopped, dry vegetative matter mixed with chemical substances (drugs). Analysis of the chemical substances in these herbal products has demonstrated that they contain synthetic cannabinoids. Because there are many cannabinoid compounds, even if a particular drug is regulated, similar compounds that differ only slightly in structure may be added in their place. Therefore a cat-and-mouse game exists between regulations on chemical substances and their propagation. This paper summarizes the pharmacological actions and dangers of chemical substances contained in law-evading herbal products by focusing on synthetic cannabinoids, as a group of chemical substances contained in these products. Furthermore, comprehensive designations of synthetic cannabinoids have been introduced as a new method of regulation that emphasizes the similarity of chemical structures; this paper also outlines the comprehensive designations. We established a psychic-dependence liability and cytotoxicity screening system for synthetic cannabinoids using animals (behavioral analysis in vivo) and cell cultures (cytotoxicity analysis in vitro). With our drug-screening system, we were able rapidly to evaluate and quantify psychic-dependence liabilities and cytotoxicity of synthetic cannabinoids contained in law-evading herbal products. These scientific data using our screening system contributed to the establishment of legislation for comprehensive designations of synthetic cannabinoids.
Code of Federal Regulations, 2010 CFR
2010-04-01
... misleading. (iii) Willfully failing to make a Federal tax return in violation of the revenue laws of the... evade any federal tax or payment thereof, knowingly counseling or suggesting to a client or prospective client an illegal plan to evade federal taxes or payment thereof, or concealing assets of himself or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
... Respect to Iran and Syria #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 77, No... Into the United States of Foreign Sanctions Evaders With Respect to Iran and Syria By the authority... evade U.S. economic and financial sanctions with respect to Iran and Syria undermine our efforts to...
7 CFR 12.10 - Scheme or device.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...
7 CFR 12.10 - Scheme or device.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 1 2014-01-01 2014-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...
7 CFR 12.10 - Scheme or device.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 1 2013-01-01 2013-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...
7 CFR 12.10 - Scheme or device.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 1 2011-01-01 2011-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...
7 CFR 12.10 - Scheme or device.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 1 2012-01-01 2012-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...
Game and Information Theory Analysis of Electronic Counter Measures in Pursuit-Evasion Games
DOE Office of Scientific and Technical Information (OSTI.GOV)
Griffin, Christopher H
Two-player Pursuit-Evasion games in the literature typically either assume both players have perfect knowledge of the opponent s positions or use primitive sensing models. This unrealistically skews the problem in favor of the pursuer who need only maintain a faster velocity at all turning radii. In real life, an evader usually escapes when the pursuer no longer knows the evader s position. In our previous work, we modeled pursuit-evasion without perfect information as a two-player bi-matrix game by using a realistic sensor model and information theory to compute game theoretic payoff matrices. That game has a saddle point when themore » evader uses strategies that exploit sensor limitations, while the pursuer relies on strategies that ignore the sensing limitations. In this paper, we consider for the first time the effect of many types of electronic counter measures (ECM) on pursuit evasion games. The evader s decision to initiate its ECM is modeled as a function of the distance between the players. Simulations show how to find optimal strategies for ECM use when initial conditions are known. We also discuss the effectiveness of different ECM technologies in pursuit-evasion games.« less
Shin, Dong-Ho; Webb, Barbara M; Nakao, Miki; Smith, Sylvia L
2009-07-01
Complement factor I is a crucial regulator of mammalian complement activity. Very little is known of complement regulators in non-mammalian species. We isolated and sequenced four highly similar complement factor I cDNAs from the liver of the nurse shark (Ginglymostoma cirratum), designated as GcIf-1, GcIf-2, GcIf-3 and GcIf-4 (previously referred to as nsFI-a, -b, -c and -d) which encode 689, 673, 673 and 657 amino acid residues, respectively. They share 95% (
Shin, Dong-Ho; Webb, Barbara M.; Nakao, Miki; Smith, Sylvia L.
2009-01-01
Complement factor I is a crucial regulator of mammalian complement activity. Very little is known of complement regulators in non-mammalian species. We isolated and sequenced four highly similar complement factor I cDNAs from the liver of the nurse shark (Ginglymostoma cirratum), designated as GcIf-1, GcIf-2, GcIf-3 and GcIf-4 (previously referred to as nsFI-a, -b, -c and –d) which encode 689, 673, 673 and 657 amino acid residues, respectively. They share 95% (≤) amino acid identities with each other, 35.4 ~ 39.6% and 62.8 ~ 65.9% with factor I of mammals and banded houndshark (Triakis scyllium), respectively. The modular structure of the GcIf is similar to that of mammals with one notable exception, the presence of a novel shark-specific sequence between the leader peptide (LP) and the factor I membrane attack complex (FIMAC) domain. The cDNA sequences differ only in the size and composition of the shark-specific region (SSR). Sequence analysis of each SSR has identified within the region two novel short sequences (SS1 and SS2) and three repeat sequences (RS1, 2 and 3). Genomic analysis has revealed the existence of three introns between the leader peptide and the FIMAC domain, tentatively designated intron 1, intron 2, and intron 3 which span 4067, 2293 and 2082 bp, respectively. Southern blot analysis suggests the presence of a single gene copy for each cDNA type. Phylogenetic analysis suggests that complement factor I of cartilaginous fish diverged prior to the emergence of mammals. All four GcIf cDNA species are expressed in four different tissues and the liver is the main tissue in which expression level of all four is high. This suggests that the expression of GcIf isotypes is tissue-dependent. PMID:19423168
Flow Structure on a Flapping Wing: Quasi-Steady Limit
NASA Astrophysics Data System (ADS)
Ozen, Cem; Rockwell, Donald
2011-11-01
The flapping motion of an insect wing typically involves quasi-steady motion between extremes of unsteady motion. This investigation characterizes the flow structure for the quasi-steady limit via a rotating wing in the form of a thin rectangular plate having a low aspect ratio (AR =1). Particle Image Velocimetry (PIV) is employed, in order to gain insight into the effects of centripetal and Coriolis forces. Vorticity, velocity and streamline patterns are used to describe the overall flow structure with an emphasis on the leading-edge vortex. A stable leading-edge vortex is maintained over effective angles of attack from 30° to 75° and it is observed that at each angle of attack the flow structure remains relatively same over the Reynolds number range from 3,600 to 14,500. The dimensionless circulation of the leading edge vortex is found to be proportional to the effective angle of attack. Quasi-three-dimensional construction of the flow structure is used to identify the different regimes along the span of the wing which is then complemented by patterns on cross flow planes to demonstrate the influence of root and tip swirls on the spanwise flow. The rotating wing results are also compared with the equivalent of translating wing to further illustrate the effects of the rotation.
Dissecting and Targeting Latent Metastasis
2015-09-01
distinct class of stem-like cancer cells , which primed to enter quiescence and evade innate immunity after infiltrating distant organs. LCC cells express...state and actively silencing WNT signaling, LCC cells can enter quiescence and evade innate immunity to remain latent for extended periods. These...mutation in Foxn1 renders the mice athymic, severely blunting the maturation of effector T cells but preserving innate immunity components including
Aybar, Lydia; Shin, Dong-Ho; Smith, Sylvia L
2009-09-01
Target cell lysis by complement is achieved by the assembly and insertion of the membrane attack complex (MAC) composed of glycoproteins C5b through C9. The lytic activity of shark complement involves functional analogues of mammalian C8 and C9. Mammalian C8 is composed of alpha, beta, and gamma subunits. The subunit structure of shark C8 is not known. This report describes a 2341 nucleotide sequence that translates into a polypeptide of 589 amino acid residues, orthologue to mammalian C8alpha and has the same modular architecture with conserved cysteines forming the peptide bond backbone. The C8gamma-binding cysteine is conserved in the perforin-like domain. Hydrophobicity profile indicates the presence of hydrophobic residues essential for membrane insertion. It shares 41.1% and 47.4% identity with human and Xenopus C8alpha respectively. Southern blot analysis showed GcC8alpha exists as a single copy gene expressed in most tissues except the spleen with the liver being the main site of synthesis. Phylogenetic analysis places it in a clade with C8alpha orthologs and as a sister taxa to the Xenopus. 2009 Elsevier Ltd.
Killeen, Gerry F; Govella, Nicodem J; Lwetoijera, Dickson W; Okumu, Fredros O
2016-04-19
Anopheles arabiensis is stereotypical of diverse vectors that mediate residual malaria transmission globally, because it can feed outdoors upon humans or cattle, or enter but then rapidly exit houses without fatal exposure to insecticidal nets or sprays. Life histories of a well-characterized An. arabiensis population were simulated with a simple but process-explicit deterministic model and relevance to other vectors examined through sensitivity analysis. Where most humans use bed nets, two thirds of An. arabiensis blood feeds and half of malaria transmission events were estimated to occur outdoors. However, it was also estimated that most successful feeds and almost all (>98 %) transmission events are preceded by unsuccessful attempts to attack humans indoors. The estimated proportion of vector blood meals ultimately obtained from humans indoors is dramatically attenuated by availability of alternative hosts, or partial ability to attack humans outdoors. However, the estimated proportion of mosquitoes old enough to transmit malaria, and which have previously entered a house at least once, is far less sensitive to both variables. For vectors with similarly modest preference for cattle over humans and similar ability to evade fatal indoor insecticide exposure once indoors, >80 % of predicted feeding events by mosquitoes old enough to transmit malaria are preceded by at least one house entry event, so long as ≥40 % of attempts to attack humans occur indoors and humans outnumber cattle ≥4-fold. While the exact numerical results predicted by such a simple deterministic model should be considered only approximate and illustrative, the derived conclusions are remarkably insensitive to substantive deviations from the input parameter values measured for this particular An. arabiensis population. This life-history analysis, therefore, identifies a clear, broadly-important opportunity for more effective suppression of residual malaria transmission by An. arabiensis in Africa and other important vectors of residual transmission across the tropics. Improved control of predominantly outdoor residual transmission by An. arabiensis, and other modestly zoophagic vectors like Anopheles darlingi, which frequently enter but then rapidly exit from houses, may be readily achieved by improving existing technology for killing mosquitoes indoors.
Avasare, Rupali S; Canetta, Pietro A; Bomback, Andrew S; Marasa, Maddalena; Caliskan, Yasar; Ozluk, Yasemin; Li, Yifu; Gharavi, Ali G; Appel, Gerald B
2018-03-07
C3 glomerulopathy is a form of complement-mediated GN. Immunosuppressive therapy may be beneficial in the treatment of C3 glomerulopathy. Mycophenolate mofetil is an attractive treatment option given its role in the treatment of other complement-mediated diseases and the results of the Spanish Group for the Study of Glomerular Diseases C3 Study. Here, we study the outcomes of patients with C3 glomerulopathy treated with steroids and mycophenolate mofetil. We conducted a retrospective chart review of patients in the C3 glomerulopathy registry at Columbia University and identified patients treated with mycophenolate mofetil for at least 3 months and follow-up for at least 1 year. We studied clinical, histologic, and genetic data for the whole group and compared data for those who achieved complete or partial remission (responders) with those who did not achieve remission (nonresponders). We compared remission with mycophenolate mofetil with remission with other immunosuppressive regimens. We identified 30 patients who met inclusion criteria. Median age was 25 years old (interquartile range, 18-36), median creatinine was 1.07 mg/dl (interquartile range, 0.79-1.69), and median proteinuria was 3200 mg/g creatinine (interquartile range, 1720-6759). The median follow-up time was 32 months (interquartile range, 21-68). Twenty (67%) patients were classified as responders. There were no significant differences in baseline characteristics between responders and nonresponders, although initial proteinuria was lower (median 2468 mg/g creatinine) in responders compared with nonresponders (median 5000 mg/g creatinine) and soluble membrane attack complex levels were higher in responders compared with nonresponders. For those tapered off mycophenolate mofetil, relapse rate was 50%. Genome-wide analysis on complement genes was done, and in 12 patients, we found 18 variants predicted to be damaging. None of these variants were previously reported to be pathogenic. Mycophenolate mofetil with steroids outperformed other immunosuppressive regimens. Among patients who tolerated mycophenolate mofetil, combination therapy with steroids induced remission in 67% of this cohort. Heavier proteinuria at the start of therapy and lower soluble membrane attack complex levels were associated with treatment resistance. Copyright © 2018 by the American Society of Nephrology.
Hochrein, Hubertus; Kirschning, Carsten J.
2013-01-01
The immune system recognizes pathogens and other danger by means of pattern recognition receptors. Recently, we have demonstrated that the orphan Toll-like receptor 13 (TLR13) senses a defined sequence of the bacterial rRNA and that bacteria use specific mechanisms to evade macrolide lincosamide streptogramin (MLS) antibiotics detection via TLR13. PMID:23802068
Diagnostic Evasion of Highly-Resistant Microorganisms: A Critical Factor in Nosocomial Outbreaks.
Zhou, Xuewei; Friedrich, Alexander W; Bathoorn, Erik
2017-01-01
Highly resistant microorganisms (HRMOs) may evade screening strategies used in routine diagnostics. Bacteria that have evolved to evade diagnostic tests may have a selective advantage in the nosocomial environment. Evasion of resistance detection can result from the following mechanisms: low-level expression of resistance genes not resulting in detectable resistance, slow growing variants, mimicry of wild-type-resistance, and resistance mechanisms that are only detected if induced by antibiotic pressure. We reviewed reports on hospital outbreaks in the Netherlands over the past 5 years. Remarkably, many outbreaks including major nation-wide outbreaks were caused by microorganisms able to evade resistance detection by diagnostic screening tests. We describe various examples of diagnostic evasion by several HRMOs and discuss this in a broad and international perspective. The epidemiology of hospital-associated bacteria may strongly be affected by diagnostic screening strategies. This may result in an increasing reservoir of resistance genes in hospital populations that is unnoticed. The resistance elements may horizontally transfer to hosts with systems for high-level expression, resulting in a clinically significant resistance problem. We advise to communicate the identification of HRMOs that evade diagnostics within national and regional networks. Such signaling networks may prevent inter-hospital outbreaks, and allow collaborative development of adapted diagnostic tests.
Staphylococcus aureus innate immune evasion is lineage-specific: a bioinfomatics study.
McCarthy, Alex J; Lindsay, Jodi A
2013-10-01
Staphylococcus aureus is a major human pathogen, and is targeted by the host innate immune system. In response, S. aureus genomes encode dozens of secreted proteins that inhibit complement, chemotaxis and neutrophil activation resulting in successful evasion of innate immune responses. These proteins include immune evasion cluster proteins (IEC; Chp, Sak, Scn), staphylococcal superantigen-like proteins (SSLs), phenol soluble modulins (PSMs) and several leukocidins. Biochemical studies have indicated that genetic variants of these proteins can have unique functions. To ascertain the scale of genetic variation in secreted immune evasion proteins, whole genome sequences of 88 S. aureus isolates, representing 25 clonal complex (CC) lineages, in the public domain were analysed across 43 genes encoding 38 secreted innate immune evasion protein complexes. Twenty-three genes were variable, with between 2 and 15 variants, and the variants had lineage-specific distributions. They include genes encoding Eap, Ecb, Efb, Flipr/Flipr-like, Hla, Hld, Hlg, Sbi, Scin-B/C and 13 SSLs. Most of these protein complexes inhibit complement, chemotaxis and neutrophil activation suggesting that isolates from each S. aureus lineage respond to the innate immune system differently. In contrast, protein complexes that lyse neutrophils (LukSF-PVL, LukMF, LukED and PSMs) were highly conserved, but can be carried on mobile genetic elements (MGEs). MGEs also encode proteins with narrow host-specificities arguing that their acquisition has important roles in host/environmental adaptation. In conclusion, this data suggests that each lineage of S. aureus evades host immune responses differently, and that isolates can adapt to new host environments by acquiring MGEs and the immune evasion protein complexes that they encode. Cocktail therapeutics that targets multiple variant proteins may be the most appropriate strategy for controlling S. aureus infections. Copyright © 2013 Elsevier B.V. All rights reserved.
Novel Mutations Causing C5 Deficiency in Three North-African Families.
Colobran, Roger; Franco-Jarava, Clara; Martín-Nalda, Andrea; Baena, Neus; Gabau, Elisabeth; Padilla, Natàlia; de la Cruz, Xavier; Pujol-Borrell, Ricardo; Comas, David; Soler-Palacín, Pere; Hernández-González, Manuel
2016-05-01
The complement system plays a central role in defense to encapsulated bacteria through opsonization and membrane attack complex (MAC) dependent lysis. The three activation pathways (classical, lectin, and alternative) converge in the cleavage of C5, which initiates MAC formation and target lysis. C5 deficiency is associated to recurrent infections by Neisseria spp. In the present study, complement deficiency was suspected in three families of North-African origin after one episode of invasive meningitis due to a non-groupable and two uncommon Meningococcal serotypes (E29, Y). Activity of alternative and classical pathways of complement were markedly reduced and the measurement of terminal complement components revealed total C5 absence. C5 gene analysis revealed two novel mutations as causative of the deficiency: Family A propositus carried a homozygous deletion of two adenines in the exon 21 of C5 gene, resulting in a frameshift and a truncated protein (c.2607_2608del/p.Ser870ProfsX3 mutation). Families B and C probands carried the same homozygous deletion of three consecutive nucleotides (CAA) in exon 9 of the C5 gene, leading to the deletion of asparagine 320 (c.960_962del/p.Asn320del mutation). Family studies confirmed an autosomal recessive inheritance pattern. Although sharing the same geographical origin, families B and C were unrelated. This prompted us to investigate this mutation prevalence in a cohort of 768 North-African healthy individuals. We identified one heterozygous carrier of the p.Asn320del mutation (allelic frequency = 0.065 %), indicating that this mutation is present at low frequency in North-African population.
Yang, Jianke; Yuan, Jian; Gao, Jiguang; Zhu, Xiaolei; Lin, Aiqin
2015-01-01
To predict B cell epitopes of hemagglutinin (HA) of human-infecting H6N1 avian influenza virus and analyze their evolutionary characteristics. The dataset was downloaded from GISAID and GenBank databases. And the linear and conformational B cell epitopes of HA were predicted separately by various bioinformatic software. Furthermore, the conservation, adaptation and other evolutionary characteristics were also analyzed by some bioinformatic means. Four linear epitopes (A, B, C and D) and two conformational epitopes (E and F) were obtained after consideration of multiple factors. And the C epitope and sites ( 41, 157, 186, 187) mutated easily, but the other epitopes were very conservative and the D epitope was the most conservative. Interestingly, the site 157 was identified under positive selection, suggesting that it may be a particularly important site to make the virus evade the attack from the host immune system. The HA of human-infecting H6N1 avian influenza virus has five conservative B cell epitopes (three linear and two conformational) and one site under positive selection. The findings would facilitate the vaccine development, virus control and pathogenesis understanding.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moldoveanu, T.; Gehring, K; Green, D
2008-01-01
The Ca{sup 2+}-dependent cysteine proteases, calpains, regulate cell migration, cell death, insulin secretion, synaptic function and muscle homeostasis. Their endogenous inhibitor, calpastatin, consists of four inhibitory repeats, each of which neutralizes an activated calpain with exquisite specificity and potency. Despite the physiological importance of this interaction, the structural basis of calpain inhibition by calpastatin is unknown. Here we report the 3.0{angstrom} structure of Ca{sup 2+}-bound m-calpain in complex with the first calpastatin repeat, both from rat, revealing the mechanism of exclusive specificity. The structure highlights the complexity of calpain activation by Ca{sup 2+}, illustrating key residues in a peripheral domainmore » that serve to stabilize the protease core on Ca{sup 2+} binding. Fully activated calpain binds ten Ca{sup 2+} atoms, resulting in several conformational changes allowing recognition by calpastatin. Calpain inhibition is mediated by the intimate contact with three critical regions of calpastatin. Two regions target the penta-EF-hand domains of calpain and the third occupies the substrate-binding cleft, projecting a loop around the active site thiol to evade proteolysis.« less
Utilizing cell-based therapeutics to overcome immune evasion in hematologic malignancies.
Sun, Chuang; Dotti, Gianpietro; Savoldo, Barbara
2016-06-30
Hematologic malignancies provide a suitable testing environment for cell-based immunotherapies, which were pioneered by the development of allogeneic hematopoietic stem cell transplant. All types of cell-based therapies, from donor lymphocyte infusion to dendritic cell vaccines, and adoptive transfer of tumor-specific cytotoxic T cells and natural killer cells, have been clinically translated for hematologic malignancies. The recent success of chimeric antigen receptor-modified T lymphocytes in B-cell malignancies has stimulated the development of this approach toward other hematologic tumors. Similarly, the remarkable activity of checkpoint inhibitors as single agents has created enthusiasm for potential combinations with other cell-based immune therapies. However, tumor cells continuously develop various strategies to evade their immune-mediated elimination. Meanwhile, the recruitment of immunosuppressive cells and the release of inhibitory factors contribute to the development of a tumor microenvironment that hampers the initiation of effective immune responses or blocks the functions of immune effector cells. Understanding how tumor cells escape from immune attack and favor immunosuppression is essential for the improvement of immune cell-based therapies and the development of rational combination approaches. © 2016 by The American Society of Hematology.
Indirect reciprocity can overcome free-rider problems on costly moral assessment.
Sasaki, Tatsuya; Okada, Isamu; Nakai, Yutaka
2016-07-01
Indirect reciprocity is one of the major mechanisms of the evolution of cooperation. Because constant monitoring and accurate evaluation in moral assessments tend to be costly, indirect reciprocity can be exploited by cost evaders. A recent study crucially showed that a cooperative state achieved by indirect reciprocators is easily destabilized by cost evaders in the case with no supportive mechanism. Here, we present a simple and widely applicable solution that considers pre-assessment of cost evaders. In the pre-assessment, those who fail to pay for costly assessment systems are assigned a nasty image that leads to them being rejected by discriminators. We demonstrate that considering the pre-assessment can crucially stabilize reciprocal cooperation for a broad range of indirect reciprocity models. In particular for the most leading social norms, we analyse the conditions under which a prosocial state becomes locally stable. © 2016 The Authors.
Antigenic Variation and Immune Escape in the MTBC
2017-01-01
Microbes that infect other organisms encounter host immune responses, and must overcome or evade innate and adaptive immune responses to successfully establish infection. Highly successful microbial pathogens, including M. tuberculosis, are able to evade adaptive immune responses (mediated by antibodies and/or T lymphocytes) and thereby establish long-term chronic infection. One mechanism that diverse pathogens use to evade adaptive immunity is antigenic variation, in which structural variants emerge that alter recognition by established immune responses and allow those pathogens to persist and/or to infect previously-immune hosts. Despite the wide use of antigenic variation by diverse pathogens, this mechanism appears to be infrequent in M. tuberculosis, as indicated by findings that known and predicted human T cell epitopes in this organism are highly conserved, although there are exceptions. These findings have implications for diagnostic tests that are based on measuring host immune responses, and for vaccine design and development. PMID:29116635
Single-axis gyroscopic motion with uncertain angular velocity about spin axis
NASA Technical Reports Server (NTRS)
Singh, S. N.
1977-01-01
A differential game approach is presented for studying the response of a gyro by treating the controlled angular velocity about the input axis as the evader, and the bounded but uncertain angular velocity about the spin axis as the pursuer. When the uncertain angular velocity about the spin axis desires to force the gyro to saturation a differential game problem with two terminal surfaces results, whereas when the evader desires to attain the equilibrium state the usual game with single terminal manifold arises. A barrier, delineating the capture zone (CZ) in which the gyro can attain saturation and the escape zone (EZ) in which the evader avoids saturation is obtained. The CZ is further delineated into two subregions such that the states in each subregion can be forced on a definite target manifold. The application of the game theoretic approach to Control Moment Gyro is briefly discussed.
A differential game solution to the Coplanar tail-chase aerial combat problem
NASA Technical Reports Server (NTRS)
Merz, A. W.; Hague, D. S.
1976-01-01
Numerical results obtained in a simplified version of the one on one aerial combat problem are presented. The primary aim of the data is to specify the roles of pursuer and evader as functions of the relative geometry and of the significant physical parameters of the problem. Numerical results are given in a case in which the slower aircraft is more maneuverable than the faster aircraft. A third order dynamic model of the relative motion is described, for which the state variables are relative range, bearing, and heading. The ranges at termination are arbitary in the present version of the problem, so the weapon systems of both aircraft can be visualized as forward firing high velocity weapons, which must be aimed at the tail pipe of the evader. It was found that, for the great majority of the ralative geometries, each aircraft can evade the weapon system of the other.
The C-terminal region of Trypanosoma cruzi MASPs is antigenic and secreted via exovesicles
De Pablos, Luis Miguel; Díaz Lozano, Isabel María; Jercic, Maria Isabel; Quinzada, Markela; Giménez, Maria José; Calabuig, Eva; Espino, Ana Margarita; Schijman, Alejandro Gabriel; Zulantay, Inés; Apt, Werner; Osuna, Antonio
2016-01-01
Trypanosoma cruzi is the etiological agent of Chagas disease, a neglected and emerging tropical disease, endemic to South America and present in non-endemic regions due to human migration. The MASP multigene family is specific to T. cruzi, accounting for 6% of the parasite’s genome and plays a key role in immune evasion. A common feature of MASPs is the presence of two conserved regions: an N-terminal region codifying for signal peptide and a C-terminal (C-term) region, which potentially acts as GPI-addition signal peptide. Our aim was the analysis of the presence of an immune response against the MASP C-term region. We found that this region is highly conserved, released via exovesicles (EVs) and has an associated immune response as revealed by epitope affinity mapping, IFA and inhibition of the complement lysis assays. We also demonstrate the presence of a fast IgM response in Balb/c mice infected with T. cruzi. Our results reveal the presence of non-canonical secreted peptides in EVs, which can subsequently be exposed to the immune system with a potential role in evading immune system targets in the parasite. PMID:27270330
Complement Activation in Arterial and Venous Thrombosis is Mediated by Plasmin
Foley, Jonathan H.; Walton, Bethany L.; Aleman, Maria M.; O'Byrne, Alice M.; Lei, Victor; Harrasser, Micaela; Foley, Kimberley A.; Wolberg, Alisa S.; Conway, Edward M.
2016-01-01
Thrombus formation leading to vaso-occlusive events is a major cause of death, and involves complex interactions between coagulation, fibrinolytic and innate immune systems. Leukocyte recruitment is a key step, mediated partly by chemotactic complement activation factors C3a and C5a. However, mechanisms mediating C3a/C5a generation during thrombosis have not been studied. In a murine venous thrombosis model, levels of thrombin–antithrombin complexes poorly correlated with C3a and C5a, excluding a central role for thrombin in C3a/C5a production. However, clot weight strongly correlated with C5a, suggesting processes triggered during thrombosis promote C5a generation. Since thrombosis elicits fibrinolysis, we hypothesized that plasmin activates C5 during thrombosis. In vitro, the catalytic efficiency of plasmin-mediated C5a generation greatly exceeded that of thrombin or factor Xa, but was similar to the recognized complement C5 convertases. Plasmin-activated C5 yielded a functional membrane attack complex (MAC). In an arterial thrombosis model, plasminogen activator administration increased C5a levels. Overall, these findings suggest plasmin bridges thrombosis and the immune response by liberating C5a and inducing MAC assembly. These new insights may lead to the development of strategies to limit thrombus formation and/or enhance resolution. PMID:27077125
Karlstetter, Marcus; Kopatz, Jens; Aslanidis, Alexander; Shahraz, Anahita; Caramoy, Albert; Linnartz-Gerlach, Bettina; Lin, Yuchen; Lückoff, Anika; Fauser, Sascha; Düker, Katharina; Claude, Janine; Wang, Yiner; Ackermann, Johannes; Schmidt, Tobias; Hornung, Veit; Skerka, Christine; Langmann, Thomas; Neumann, Harald
2017-02-01
Age-related macular degeneration (AMD) is a major cause of blindness in the elderly population. Its pathophysiology is linked to reactive oxygen species (ROS) and activation of the complement system. Sialic acid polymers prevent ROS production of human mononuclear phagocytes via the inhibitory sialic acid-binding immunoglobulin-like lectin-11 (SIGLEC11) receptor. Here, we show that low-dose intravitreal injection of low molecular weight polysialic acid with average degree of polymerization 20 (polySia avDP20) in humanized transgenic mice expressing SIGLEC11 on mononuclear phagocytes reduced their reactivity and vascular leakage induced by laser coagulation. Furthermore, polySia avDP20 prevented deposition of the membrane attack complex in both SIGLEC11 transgenic and wild-type animals. In vitro, polySia avDP20 showed two independent, but synergistic effects on the innate immune system. First, polySia avDP20 prevented tumor necrosis factor-α, vascular endothelial growth factor A, and superoxide production by SIGLEC11-positive phagocytes. Second, polySia avDP20 directly interfered with complement activation. Our data provide evidence that polySia avDP20 ameliorates laser-induced damage in the retina and thus is a promising candidate to prevent AMD-related inflammation and angiogenesis. © 2016 The Authors. Published under the terms of the CC BY 4.0 license.
A surgeons' guide to renal transplant immunopathology, immunology, and immunosuppression.
Gaber, Lillian W; Knight, Richard J; Patel, Samir J
2013-12-01
The response to allografting involves adaptive and innate immune mechanisms. In the adaptive system, activated T cells differentiate to cytotoxic effectors that attack the graft and trigger B cells to differentiation to plasma cells that produce anti-HLA antibodies. The innate immune system recognizes antigens in a non-specific manner and recruits immune cells to the graft through the productions of chemotactic factors, and activation of cytokines and the complement cascade. In the kidney the tubules and the endothelium are the targets of the rejection response. Immune suppression is effective in modulating the adaptive immune system effect on graft histology. Copyright © 2013 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
The Dynamics of Factions and Consensus in Chinese Politics: A Model and Some Propositions.
1980-07-01
easy solutions evade China, this group has become increasingly aggressive, calling for further purges of the "sworn followers of the Gang of Four" and...quarters for "tpractical solutions ," as the Chinese have ritualistically done periodi- cally since the mid-l9th century. Factionalism is likely to remain a... solutions evade China, the majority of this category of rehabilitated cadres have become increas- ingly aggressive in calling for the purging of the
Porcine Knock-in Fibroblasts Expressing hDAF on α-1,3-Galactosyltransferase (GGTA1) Gene Locus.
Kim, Ji Woo; Kim, Hye-Min; Lee, Sang Mi; Kang, Man-Jong
2012-10-01
The Galactose-α1,3-galactose (α1,3Gal) epitope is responsible for hyperacute rejection in pig-to-human xenotransplantation. Human decay-accelerating factor (hDAF) is a cell surface regulatory protein that serves as a complement inhibitor to protect self cells from complement attack. The generation of α1,3-galactosyltransferase (GGTA1) knock-out pigs expressing DAF is a necessary step for their use as organ donors for humans. In this study, we established GGTA1 knock-out cell lines expressing DAF from pig ear fibroblasts for somatic cell nuclear transfer. hDAF expression was detected in hDAF knock-in heterozygous cells, but not in normal pig cells. Expression of the GGTA1 gene was lower in the knock-in heterozygous cell line compared to the normal pig cell. Knock-in heterozygous cells afforded more effective protection against cytotoxicity with human serum than with GGTA1 knock-out heterozygous and control cells. These cell lines may be used in the production of GGTA1 knock-out and DAF expression pigs for xenotransplantation.
Induction of passive Heymann nephritis in complement component 6-deficient PVG rats.
Spicer, S Timothy; Tran, Giang T; Killingsworth, Murray C; Carter, Nicole; Power, David A; Paizis, Kathy; Boyd, Rochelle; Hodgkinson, Suzanne J; Hall, Bruce M
2007-07-01
Passive Heymann nephritis (PHN), a model of human membranous nephritis, is induced in susceptible rat strains by injection of heterologous antisera to rat renal tubular Ag extract. PHN is currently considered the archetypal complement-dependent form of nephritis, with the proteinuria resulting from sublytic glomerular epithelial cell injury induced by the complement membrane attack complex (MAC) of C5b-9. This study examined whether C6 and MAC are essential to the development of proteinuria in PHN by comparing the effect of injection of anti-Fx1A antisera into PVG rats deficient in C6 (PVG/C6(-)) and normal PVG rats (PVG/c). PVG/c and PVG/C6(-) rats developed similar levels of proteinuria at 3, 7, 14, and 28 days following injection of antisera. Isolated whole glomeruli showed similar deposition of rat Ig and C3 staining in PVG/c and PVG/C6(-) rats. C9 deposition was abundant in PVG/c but was not detected in PVG/C6(-) glomeruli, indicating C5b-9/MAC had not formed in PVG/C6(-) rats. There was also no difference in the glomerular cellular infiltrate of T cells and macrophages nor the size of glomerular basement membrane deposits measured on electron micrographs. To examine whether T cells effect injury, rats were depleted of CD8+ T cells which did not affect proteinuria in the early heterologous phase but prevented the increase in proteinuria associated with the later autologous phase. These studies showed proteinuria in PHN occurs without MAC and that other mechanisms, such as immune complex size, early complement components, CD4+ and CD8+ T cells, disrupt glomerular integrity and lead to proteinuria.
Nishimura, Masayuki; Takada, Norikazu; Hashiba, Eiji; Kimura, Futoshi; Kitayama, Masatou; Hashimoto, Hiroshi
2014-01-01
A 44-year-old man (ASA-PS 1) underwent right lobectomy of the liver under total intravenous anesthesia with propofol, remifentanil, ketamine and rocuronium. In order to evade allogeneic blood transfusion, 1,200 g of the patient's blood was taken and hemodilution was induced for autologous blood transfusion (HAT) after the induction of anesthesia. As intraoperative blood loss amounted to about 4,000 g, Hb level decreased from 13.6 to 6.2 g x dl(-1). However, as intraoperative hemodynamics was relatively stable with crystalloidal and colloidal transfusion with no ischemic change on ECG and no metabolic acidosis, autologous blood transfusion was withheld. After returning the autologous blood, Hb increased to 9.8 g x dl(-1). Any postoperative complications related to the low Hb level were not recognized. HAT is a useful method to evade or at least decrease the amount of allogeneic blood transfusion by anesthesiologists.
Voyich, Jovanka M; Sturdevant, Daniel E; Braughton, Kevin R; Kobayashi, Scott D; Lei, Benfang; Virtaneva, Kimmo; Dorward, David W; Musser, James M; DeLeo, Frank R
2003-02-18
Group A Streptococcus (GAS) evades polymorphonuclear leukocyte (PMN) phagocytosis and killing to cause human disease, including pharyngitis and necrotizing fasciitis (flesh-eating syndrome). We show that GAS genes differentially regulated during phagocytic interaction with human PMNs comprise a global pathogen-protective response to innate immunity. GAS prophage genes and genes involved in virulence, oxidative stress, cell wall biosynthesis, and gene regulation were up-regulated during PMN phagocytosis. Genes encoding novel secreted proteins were up-regulated, and the proteins were produced during human GAS infections. We discovered an essential role for the Ihk-Irr two-component regulatory system in evading PMN-mediated killing and promoting host-cell lysis, processes that would facilitate GAS pathogenesis. Importantly, the irr gene was highly expressed during human GAS pharyngitis. We conclude that a complex pathogen genetic program circumvents human innate immunity to promote disease. The gene regulatory program revealed by our studies identifies previously undescribed potential vaccine antigens and targets for therapeutic interventions designed to control GAS infections.
Weston, Michael A; Schlacher, Thomas A; Lynn, David
2014-05-01
Vehicles on beaches cause numerous deleterious effects to coastal wildlife. These impacts may, hypothetically, be lessened if drivers act to reduce disturbance. Since it is unknown to what extent such behavior occurs, and whether it can reduce disturbance, we quantified the behavior of drivers who encountered birds on open-coast, sandy beaches in eastern Australia and the consequent bird responses. Drivers of commercial tourist buses never slowed or altered course ("evaded birds") to avoid disturbing birds; conversely, 34 % of drivers of private cars did evade birds. Drivers of vehicles with fishing rod holders tended (P = 0.09) to evade birds more frequently than non-fishing vehicles. Evasion, when it occurred, was modest, and did not significantly decrease the intensity of bird response or the probability of escapes on the wing. Voluntary behavioral adjustments to alleviate impacts on wildlife may be unworkable, suggesting that other solutions (e.g., beach closures) might be the only effective and feasible way to reduce disturbance to birds on ocean beaches.
Neutrophils extracellular traps damage Naegleria fowleri trophozoites opsonized with human IgG.
Contis-Montes de Oca, A; Carrasco-Yépez, M; Campos-Rodríguez, R; Pacheco-Yépez, J; Bonilla-Lemus, P; Pérez-López, J; Rojas-Hernández, S
2016-08-01
Naegleria fowleri infects humans through the nasal mucosa causing a disease in the central nervous system known as primary amoebic meningoencephalitis (PAM). Polymorphonuclear cells (PMNs) play a critical role in the early phase of N. fowleri infection. Recently, a new biological defence mechanism called neutrophil extracellular traps (NETs) has been attracting attention. NETs are composed of nuclear DNA combined with histones and antibacterial proteins, and these structures are released from the cell to direct its antimicrobial attack. In this work, we evaluate the capacity of N. fowleri to induce the liberation of NETs by human PMN cells. Neutrophils were cocultured with unopsonized or IgG-opsonized N. fowleri trophozoites. DNA, histone, myeloperoxidase (MPO) and neutrophil elastase (NE) were stained, and the formation of NETs was evaluated by confocal microscopy and by quantifying the levels of extracellular DNA. Our results showed N. fowleri induce the liberation of NETs including release of MPO and NE by human PMN cells as exposure interaction time is increased, but N. fowleri trophozoites evaded killing. However, when trophozoites were opsonized, they were susceptible to the neutrophils activity. Therefore, our study suggests that antibody-mediated PMNs activation through NET formation may be crucial for antimicrobial responses against N. fowleri. © 2016 John Wiley & Sons Ltd.
Fischer, M M
2001-12-01
A reading of the puzzle novel Vienna Blood, by Adrian Mathews, is juxtaposed to three ethnographic sketches of contemporary ethical plateaus or domains of ethical challenge--the challenges of informed public consent to new technologies, the seductions to do whatever is medically possible (sometimes at the expense of quality of life or the good death'). and the power of money in driving the biotechnological industries. Vienna Blood deals with precautionary germplasm modification and chemical camouflage justified as protection against ethnically-targeted biological warfare, and touches on a series of technologies such as new reproductive technologies, genetic engineering, and cryptographic attacks and defenses, as well as the ability to evade regulatory controls. Such technoscientifically informed novels are useful as cautionary tales, in exploring the complexity and interaction among new technologies, and the phantasmagoria that help drive new technologies. They are not so good at thinking through institutional development: a challenge for ethnography and new social theory. Ethnography, like novels, can function as checks on the mechanisms of abstraction and universalization that frequently bedevil the non-anthropological, non-cross-culturally or cross-temporally comparative, social sciences. Questions are raised about new or emergent biosocialities, forms of governance, and forms of cultural critique.
Effects of deterministic and random refuge in a prey-predator model with parasite infection.
Mukhopadhyay, B; Bhattacharyya, R
2012-09-01
Most natural ecosystem populations suffer from various infectious diseases and the resulting host-pathogen dynamics is dependent on host's characteristics. On the other hand, empirical evidences show that for most host pathogen systems, a part of the host population always forms a refuge. To study the role of refuge on the host-pathogen interaction, we study a predator-prey-pathogen model where the susceptible and the infected prey can undergo refugia of constant size to evade predator attack. The stability aspects of the model system is investigated from a local and global perspective. The study reveals that the refuge sizes for the susceptible and the infected prey are the key parameters that control possible predator extinction as well as species co-existence. Next we perform a global study of the model system using Lyapunov functions and show the existence of a global attractor. Finally we perform a stochastic extension of the basic model to study the phenomenon of random refuge arising from various intrinsic, habitat-related and environmental factors. The stochastic model is analyzed for exponential mean square stability. Numerical study of the stochastic model shows that increasing the refuge rates has a stabilizing effect on the stochastic dynamics. Copyright © 2012 Elsevier Inc. All rights reserved.
Langereis, Jeroen D; Weiser, Jeffrey N
2014-07-22
Nontypeable Haemophilus influenzae is a frequent cause of noninvasive mucosal inflammatory diseases but may also cause invasive diseases, such as sepsis and meningitis, especially in children and the elderly. Infection by nontypeable Haemophilus influenzae is characterized by recruitment of neutrophilic granulocytes. Despite the presence of a large number of neutrophils, infections with nontypeable Haemophilus influenzae are often not cleared effectively by the antimicrobial activity of these immune cells. Herein, we examined how nontypeable Haemophilus influenzae evades neutrophil-mediated killing. Transposon sequencing (Tn-seq) was used on an isolate resistant to neutrophil-mediated killing to identify genes required for its survival in the presence of human neutrophils and serum, which provided a source of complement and antibodies. Results show that nontypeable Haemophilus influenzae prevents complement-dependent neutrophil-mediated killing by expression of surface galactose-containing oligosaccharide structures. These outer-core structures block recognition of an inner-core lipooligosaccharide epitope containing glucose attached to heptose HepIII-β1,2-Glc by replacement with galactose attached to HepIII or through shielding HepIII-β1,2-Glc by phase-variable attachment of oligosaccharide chain extensions. When the HepIII-β1,2-Glc-containing epitope is expressed and exposed, nontypeable Haemophilus influenzae is opsonized by naturally acquired IgM generally present in human serum and subsequently phagocytosed and killed by human neutrophils. Clinical nontypeable Haemophilus influenzae isolates containing galactose attached to HepIII that are not recognized by this IgM are more often found to cause invasive infections. Importance: Neutrophils are white blood cells that specialize in killing pathogens and are recruited to sites of inflammation. However, despite the presence of large numbers of neutrophils in the middle ear cavity and lungs of patients with otitis media or chronic obstructive pulmonary disease, respectively, the bacterium nontypeable Haemophilus influenzae is often not effectively cleared from these locations by these immune cells. In order to understand how nontypeable Haemophilus influenzae is able to cause inflammatory diseases in the presence of neutrophils, we determined the mechanism that underlies resistance to neutrophil-mediated killing. We have shown that nontypeable Haemophilus influenzae prevents binding of antibodies of the IgM subtype through changes in their surface lipooligosaccharide structure, thereby preventing complement activation and clearance by human neutrophils. Copyright © 2014 Langereis and Weiser.
Indole-based novel small molecules for the modulation of bacterial signalling pathways.
Biswas, Nripendra Nath; Kutty, Samuel K; Barraud, Nicolas; Iskander, George M; Griffith, Renate; Rice, Scott A; Willcox, Mark; Black, David StC; Kumar, Naresh
2015-01-21
Gram-negative bacteria such as Pseudomonas aeruginosa use N-acylated L-homoserine lactones (AHLs) as autoinducers (AIs) for quorum sensing (QS), a major regulatory and cell-to-cell communication system for social adaptation, virulence factor production, biofilm formation and antibiotic resistance. Some bacteria use indole moieties for intercellular signaling and as regulators of various bacterial phenotypes important for evading the innate host immune response and antimicrobial resistance. A range of natural and synthetic indole derivatives have been found to act as inhibitors of QS-dependent bacterial phenotypes, complementing the bactericidal ability of traditional antibiotics. In this work, various indole-based AHL mimics were designed and synthesized via the 1-ethyl-3-(3-dimethylaminopropyl)carbodiimide hydrochloride (EDC·HCl) and N,N'-dicyclohexylcarbodiimide (DCC) mediated coupling reactions of a variety of substituted or unsubstituted aminoindoles with different alkanoic acids. All synthesized compounds were tested for QS inhibition using a P. aeruginosa QS reporter strain by measuring the amount of green fluorescent protein (GFP) production. Docking studies were performed to examine their potential to bind and therefore inhibit the target QS receptor protein. The most potent compounds 11a, 11d and 16a showed 44 to 65% inhibition of QS activity at 250 μM concentration, and represent promising drug leads for the further development of anti-QS antimicrobial compounds.
Neutrophil-generated oxidative stress and protein damage in Staphylococcus aureus
Beavers, William N.; Skaar, Eric P.
2016-01-01
Staphylococcus aureus is a ubiquitous, versatile and dangerous pathogen. It colonizes over 30% of the human population, and is one of the leading causes of death by an infectious agent. During S. aureus colonization and invasion, leukocytes are recruited to the site of infection. To combat S. aureus, leukocytes generate an arsenal of reactive species including superoxide, hydrogen peroxide, nitric oxide and hypohalous acids that modify and inactivate cellular macromolecules, resulting in growth defects or death. When S. aureus colonization cannot be cleared by the immune system, antibiotic treatment is necessary and can be effective. Yet, this organism quickly gains resistance to each new antibiotic it encounters. Therefore, it is in the interest of human health to acquire a deeper understanding of how S. aureus evades killing by the immune system. Advances in this field will have implications for the design of future S. aureus treatments that complement and assist the host immune response. In that regard, this review focuses on how S. aureus avoids host-generated oxidative stress, and discusses the mechanisms used by S. aureus to survive oxidative damage including antioxidants, direct repair of damaged proteins, sensing oxidant stress and transcriptional changes. This review will elucidate areas for studies to identify and validate future antimicrobial targets. PMID:27354296
Construction of Barrier in a Fishing Game With Point Capture.
Zha, Wenzhong; Chen, Jie; Peng, Zhihong; Gu, Dongbing
2017-06-01
This paper addresses a particular pursuit-evasion game, called as "fishing game" where a faster evader attempts to pass the gap between two pursuers. We are concerned with the conditions under which the evader or pursuers can win the game. This is a game of kind in which an essential aspect, barrier, separates the state space into disjoint parts associated with each player's winning region. We present a method of explicit policy to construct the barrier. This method divides the fishing game into two subgames related to the included angle and the relative distances between the evader and the pursuers, respectively, and then analyzes the possibility of capture or escape for each subgame to ascertain the analytical forms of the barrier. Furthermore, we fuse the games of kind and degree by solving the optimal control strategies in the minimum time for each player when the initial state lies in their winning regions. Along with the optimal strategies, the trajectories of the players are delineated and the upper bounds of their winning times are also derived.
Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
2007-09-01
A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node and trust neighborhood, collecting parametric information and executing assigned decision tasks. The communications overhead due to security mechanisms and the latency in network response are thus minimized by reducing the need to move large amounts of audit data through resource-limited nodes and by locating detection/identification programs closer to audit data. If network partitioning occurs due to uncoordinated node exhaustion, data compromise or other effects of the attacks, the mobile agents can continue to operate, thereby increasing fault tolerance in the network response to intrusions. Since the mobile agents behave like an ant colony in securing the WSN, published ant colony optimization (ACO) routines and other evolutionary algorithms are adapted to protect network security, using data at and through nodes to create audit records to detect and respond to denial-of-service attacks. Performance evaluations of algorithms are performed by simulation of a few intrusion attacks, such as black hole, flooding, Sybil and others, to validate the ability of the cross-layer algorithms to enable WSNs to survive the attacks. Results are compared for the different algorithms.
Lutein and atherosclerosis: Belfast versus Toulouse revisited.
Howard, A N; Thurnham, D I
2017-01-01
In 1995 we reported that mean plasma lutein concentrations in salaried men and women from Toulouse in Southern France were double those in subjects recruited from general practitioner lists in Belfast, Northern Ireland. At the time incidence of coronary heart disease (CHD) in Southern France was among the lowest in Europe and was much higher in Northern Ireland. Plasma lutein is a biomarker of vegetable and fruit intake and evidence suggests that high concentrations are generally associated with better cardiometabolic health. At the time we speculated like others that role of the carotenoids may well have been to prevent oxidation of lipid in the lipoproteins and so reduce the uptake of oxidised lipid by macrophages and its deposition within the intimal layers of the major arteries as plaque. It is now widely accepted that CHD is an inflammatory disease and that macrophages within plaque together with tissue damage contribute to this inflammation. Stimulated macrophages release cytokines to activate the immune system both locally and systemically. Precursor complement proteins in the blood are activated to assist immune cells in phagocytosis and cell repair. Individuals with a history of arteriosclerosis display significantly higher concentrations of complement factors C3 and C3a than subjects without such a history. Metabolism of C3 via the alternate complement pathway can give rise to the membrane attack complex (MAC) which creates a hole or pore in pathogens or host cells, killing the cell. Recent studies in patients with early age related macular disease (AMD) who also exhibit similar elevated concentrations of complement proteins in their blood, showed supplementation with lutein progressively decreased the amount of the MAC and other complement factors in the blood. Lutein was used in the supplementation experiments because it is an important constituent of macular pigment. Thus the healthier cardiometabolic features displayed by the people in Toulouse may have been due to the effects of concurrent high concentrations of plasma lutein on the immune system and complement in particular. Other carotenoids may exert similar antioxidant effects but we and others found no differences in antioxidant nutrients between subjects in Toulouse and Belfast or between subjects with asymptomatic markers of atherosclerosis and controls. Copyright © 2016 Elsevier Ltd. All rights reserved.
Graham, Matthew; Shin, Dong-Ho; Smith, Sylvia L
2009-07-01
We present the complete cDNA sequence of shark (Ginglymostoma cirratum) pro-C5 and its molecular characterization with a descriptive analysis of the structural elements necessary for its potential functional role as a potent mediator of inflammation (fragment C5a) and initiator molecule (fragment C5b) for the assembly of the membrane attack complex (MAC) upon activation by C5 convertase. In mammals the three complement activation cascades, the classical, alternative and lectin pathways, converge at the activation of C3, a pivotal complement protein. It is, however, the subsequent activation of the next complement component, C5, which is the focal point at which the initiation of the terminal lytic pathway takes place and involves the stepwise assembly of the MAC. The effector cytolytic function of complement occurs with the insertion of MAC into target membranes causing dough-nut like holes and cell leakage. The lytic activity of shark complement results in structurally similar holes in target membranes suggesting the assembly of a shark MAC that likely involves a functional analogue of C5. The composition of shark MAC remains unresolved and to date conclusive evidence has been lacking for shark C5. The gene has not been cloned nor has the serum protein been characterized for any elasmobranch species. This report is the first to confirm the presence of C5 homologue in the shark. GcC5 is remarkably similar to human C5 in overall structure and domain arrangement. The GcC5 cDNA measured 5160-bp with 5' and 3' UTRs of 35 bp and 79 bp, respectively. Structural analysis of the derived protein sequence predicts a molecule that is a two-chain structure which lacks a thiolester bond and contains a C5 convertase cleavage site indicating that activation will generate two peptides, akin to C5b and C5a. The putative GcC5 molecule also contains the C-terminal C345C/Netrin module that characterizes C3, C4 and C5. Multiple alignment of deduced amino acid sequences shows that GcC5 shares more amino acid identities/similarities with mammals than that with bony fish. We conclude that at the time of emergence of sharks the elaborate mosaic structure of C5 had already evolved.
Graham, Matthew; Shin, Dong-Ho; Smith, Sylvia L.
2009-01-01
We present the complete cDNA sequence of shark (Ginglymostoma cirratum) pro-C5 and its molecular characterization with a descriptive analysis of the structural elements necessary for its potential functional role as a potent mediator of inflammation (fragment C5a) and initiator molecule (fragment C5b) for the assembly of the membrane attack complex (MAC) upon activation by C5 convertase. In mammals the three complement activation cascades, the classical, alternative and lectin pathways, converge at the activation of C3, a pivotal complement protein. It is, however, the subsequent activation of the next complement component, C5, which is the focal point at which the initiation of the terminal lytic pathway takes place and involves the stepwise assembly of the MAC. The effector cytolytic function of complement occurs with the insertion of MAC into target membranes causing dough-nut like holes and cell leakage. The lytic activity of shark complement results in structurally similar holes in target membranes suggesting the assembly of a shark MAC that likely involves a functional analogue of C5. The composition of shark MAC remains unresolved and to date conclusive evidence has been lacking for shark C5. The gene has not been cloned nor has the serum protein been characterized for any elasmobranch species. This report is the first to confirm the presence of C5 homologue in the shark. GcC5 is remarkably similar to human C5 in overall structure and domain arrangement. The GcC5 cDNA measured 5160-bp with 5′ and 3′ UTRs of 35bp and 79bp, respectively. Structural analysis of the derived protein sequence predicts a molecule that is a two-chain structure which lacks a thiolester bond and contains a C5 convertase cleavage site indicating that activation will generate two peptides, akin to C5b and C5a. The putative GcC5 molecule also contains the C-terminal C345C/Netrin module that characterizes C3, C4 and C5. Multiple alignment of deduced amino acid sequences show that GcC5 shares more amino acid identities/similarities with mammals than that with bony fish. We conclude that at the time of emergence of sharks the elaborate mosaic structure of C5 had already evolved. PMID:19410004
Forbes-Beadle, Lauren; Crossman, Tova; Johnson, Travis K; Burke, Richard; Warr, Coral G; Whisstock, James C
2016-10-01
Pore-forming members of the membrane attack complex/perforin-like (MACPF) protein superfamily perform well-characterized roles as mammalian immune effectors. For example, complement component 9 and perforin function to directly form pores in the membrane of Gram-negative pathogens or virally infected/transformed cells, respectively. In contrast, the only known MACPF protein in Drosophila melanogaster, Torso-like, plays crucial roles during development in embryo patterning and larval growth. Here, we report that in addition to these functions, Torso-like plays an important role in Drosophila immunity. However, in contrast to a hypothesized effector function in, for example, elimination of Gram-negative pathogens, we find that torso-like null mutants instead show increased susceptibility to certain Gram-positive pathogens such as Staphylococcus aureus and Enterococcus faecalis We further show that this deficit is due to a severely reduced number of circulating immune cells and, as a consequence, an impaired ability to phagocytose bacterial particles. Together these data suggest that Torso-like plays an important role in controlling the development of the Drosophila cellular immune system. Copyright © 2016 by the Genetics Society of America.
Bahia El Idrissi, Nawal; Iyer, Anand M; Ramaglia, Valeria; Rosa, Patricia S; Soares, Cleverson T; Baas, Frank; Das, Pranab K
2017-01-01
Mycobacterium leprae (M. leprae) infection causes nerve damage and the condition worsens often during and long after treatment. Clearance of bacterial antigens including lipoarabinomannan (LAM) during and after treatment in leprosy patients is slow. We previously demonstrated that M. leprae LAM damages peripheral nerves by in situ generation of the membrane attack complex (MAC). Investigating the role of complement activation in skin lesions of leprosy patients might provide insight into the dynamics of in situ immune reactivity and the destructive pathology of M. leprae. In this study, we analyzed in skin lesions of leprosy patients, whether M. leprae antigen LAM deposition correlates with the deposition of complement activation products MAC and C3d on nerves and cells in the surrounding tissue. Skin biopsies of paucibacillary (n = 7), multibacillary leprosy patients (n = 7), and patients with erythema nodosum leprosum (ENL) (n = 6) or reversal reaction (RR) (n = 4) and controls (n = 5) were analyzed. The percentage of C3d, MAC and LAM deposition was significantly higher in the skin biopsies of multibacillary compared to paucibacillary patients (p = <0.05, p = <0.001 and p = <0.001 respectively), with a significant association between LAM and C3d or MAC in the skin biopsies of leprosy patients (r = 0.9578, p< 0.0001 and r = 0.8585, p<0.0001 respectively). In skin lesions of multibacillary patients, MAC deposition was found on axons and co-localizing with LAM. In skin lesions of paucibacillary patients, we found C3d positive T-cells in and surrounding granulomas, but hardly any MAC deposition. In addition, MAC immunoreactivity was increased in both ENL and RR skin lesions compared to non-reactional leprosy patients (p = <0.01 and p = <0.01 respectively). The present findings demonstrate that complement is deposited in skin lesions of leprosy patients, suggesting that inflammation driven by complement activation might contribute to nerve damage in the lesions of these patients. This should be regarded as an important factor in M. leprae nerve damage pathology.
Musoke, A J; Williams, J F
1975-01-01
Passive transfer of immunity to Taenia taeniaeformis was achieved with serum taken 14, 21, 49 and 63 days after infection. The protective capacity of serum collected at 14 and 21 days resided in the 7Sgamma2 immunoglobulins and appeared to be partics the infection progressed the range of chromatographic fractions showing protective capacity was extended to all those containing 7Sgamma2 and 7Sgamma1 immunoglobulins. Fractions enriched for gammaM did not confer protection. Immune serum containing 7Sgamma2a antibodies was able to kill developing parasites after they had left the intestine, and the hepatic postoncospheral forms retained their susceptibility to antibody over the first 5 days of growth. After that time they rapidly became insusceptible to antibody both in vivo and in vitro. Susceptibility to antibody-mediated attack was complement dependent. This appears to be the first time that complement has been demonstrated to play a role in immunity to a helminth infection in vivo. This finding is discussed in relation to the phenomenon of cestode parasite survival in immune animals. Images FIG. 1 PMID:1201860
Hubert, Kerstin; Pawlik, Marie-Christin; Claus, Heike; Jarva, Hanna; Meri, Seppo; Vogel, Ulrich
2012-01-01
Neisseria meningitidis employs polysaccharides and outer membrane proteins to cope with human serum complement attack. To screen for factors influencing serum resistance, an assay was developed based on a colorimetric serum bactericidal assay. The screening used a genetically modified sequence type (ST)-41/44 clonal complex (cc) strain lacking LPS sialylation, polysaccharide capsule, the factor H binding protein (fHbp) and MutS, a protein of the DNA repair mechanism. After killing of >99.9% of the bacterial cells by serum treatment, the colorimetric assay was used to screen 1000 colonies, of which 35 showed enhanced serum resistance. Three mutant classes were identified. In the first class of mutants, enhanced expression of Opc was identified. Opc expression was associated with vitronectin binding and reduced membrane attack complex deposition confirming recent observations. Lipopolysaccharide (LPS) immunotype switch from immunotype L3 to L8/L1 by lgtA and lgtC phase variation represented the second class. Isogenic mutant analysis demonstrated that in ST-41/44 cc strains the L8/L1 immunotype was more serum resistant than the L3 immunotype. Consecutive analysis revealed that the immunotypes L8 and L1 were frequently observed in ST-41/44 cc isolates from both carriage and disease. Immunotype switch to L8/L1 is therefore suggested to contribute to the adaptive capacity of this meningococcal lineage. The third mutant class displayed a pilE allelic exchange associated with enhanced autoaggregation. The mutation of the C terminal hypervariable region D of PilE included a residue previously associated with increased pilus bundle formation. We suggest that autoaggregation reduced the surface area accessible to serum complement and protected from killing. The study highlights the ability of meningococci to adapt to environmental stress by phase variation and intrachromosomal recombination affecting subcapsular antigens.
Hubert, Kerstin; Pawlik, Marie-Christin; Claus, Heike; Jarva, Hanna; Meri, Seppo; Vogel, Ulrich
2012-01-01
Neisseria meningitidis employs polysaccharides and outer membrane proteins to cope with human serum complement attack. To screen for factors influencing serum resistance, an assay was developed based on a colorimetric serum bactericidal assay. The screening used a genetically modified sequence type (ST)-41/44 clonal complex (cc) strain lacking LPS sialylation, polysaccharide capsule, the factor H binding protein (fHbp) and MutS, a protein of the DNA repair mechanism. After killing of >99.9% of the bacterial cells by serum treatment, the colorimetric assay was used to screen 1000 colonies, of which 35 showed enhanced serum resistance. Three mutant classes were identified. In the first class of mutants, enhanced expression of Opc was identified. Opc expression was associated with vitronectin binding and reduced membrane attack complex deposition confirming recent observations. Lipopolysaccharide (LPS) immunotype switch from immunotype L3 to L8/L1 by lgtA and lgtC phase variation represented the second class. Isogenic mutant analysis demonstrated that in ST-41/44 cc strains the L8/L1 immunotype was more serum resistant than the L3 immunotype. Consecutive analysis revealed that the immunotypes L8 and L1 were frequently observed in ST-41/44 cc isolates from both carriage and disease. Immunotype switch to L8/L1 is therefore suggested to contribute to the adaptive capacity of this meningococcal lineage. The third mutant class displayed a pilE allelic exchange associated with enhanced autoaggregation. The mutation of the C terminal hypervariable region D of PilE included a residue previously associated with increased pilus bundle formation. We suggest that autoaggregation reduced the surface area accessible to serum complement and protected from killing. The study highlights the ability of meningococci to adapt to environmental stress by phase variation and intrachromosomal recombination affecting subcapsular antigens. PMID:23028802
2011-01-01
Hereditary angioedema (HAE) caused by C1-esterase inhibitor deficiency is an autosomal-dominant disease resulting from a mutation in the C1-inhibitor gene. HAE is characterized by recurrent attacks of intense, massive, localized subcutaneous edema involving the extremities, genitalia, face, or trunk, or submucosal edema of upper airway or bowels. These symptoms may be disabling, have a dramatic impact on quality of life, and can be life-threatening when affecting the upper airways. Because the manifestations and severity of HAE are highly variable and unpredictable, patients need individualized care to reduce the burden of HAE on daily life. Although effective therapy for the treatment of HAE attacks has been available in many countries for more than 30 years, until recently, there were no agents approved in the United States to treat HAE acutely. Therefore, prophylactic therapy is an integral part of HAE treatment in the United States and for selected patients worldwide. Routine long-term prophylaxis with either attenuated androgens or C1-esterase inhibitor has been shown to reduce the frequency and severity of HAE attacks. Therapy with attenuated androgens, a mainstay of treatment in the past, has been marked by concern about potential adverse effects. C1-esterase inhibitor works directly on the complement and contact plasma cascades to reduce bradykinin release, which is the primary pathologic mechanism in HAE. Different approaches to long-term prophylactic therapy can be used to successfully manage HAE when tailored to meet the needs of the individual patient. PMID:23283143
Binding of human and rat CD59 to the terminal complement complexes.
Lehto, T; Morgan, B P; Meri, S
1997-01-01
CD59-antigen (protectin) is a widely distributed glycolipid-anchored inhibitor of complement lysis. CD59 interacts with complement components C8 and C9 during assembly of the membrane attack complex (MAC). To evaluate species specificity of these interactions we have in the present study examined cross-species binding of isolated human and rat CD59 to the terminal complement components C8 and C9. By using primarily soluble CD59 isolated from urine (CD59U) potentially non-specific binding interactions of the phospholipid portion of the membrane forms of CD59 could be avoided. Sucrose density gradient ultracentrifugation analysis showed that human CD59U bound to both human and rat C8 in the SC5b-8 complexes. Similar binding occurred when rat CD59U was used. The degree of binding did not significantly differ between the heterologous and homologous CD59-C8 combinations. C9 from both species inhibited the binding of CD59 to soluble SC5b-8. In ligand blotting analysis human and rat CD59U bound to human and rat C8 alpha gamma-subunit and C9. Binding of human and rat CD59U was stronger to human than rat C9. In plate binding assays the erythrocyte form of CD59 (CD59E) bound to both human and rat C8. Binding of CD59E to heterologous C9 was considerably weaker than to homologous C9. Our results imply that the reciprocal binding sites between C8 and CD59 and to a lesser degree between CD59 and C9 are conserved between human and rat. Interactions of CD59 with the terminal C components are thus species selective but not 'homologously restricted'. Images Figure 4 Figure 5 PMID:9038722
Husler, T; Lockert, D H; Sims, P J
1996-03-12
CD59 antigen is a membrane glycoprotein that inhibits the activity of the C9 component of the C5b-9 membrane attack complex (MAC), thereby protecting human cells from lysis by human complement. The complement-inhibitory activity of CD59 is species-selective, and is most effective toward C9 derived from human or other primate plasma. The species-selective activity of CD59 was recently used to map the segment of human C9 that is recognized by this MAC inhibitor, using recombinant rabbit/human C9 chimeras that retain lytic function within the MAC [Husler, T., Lockert, D. H., Kaufman, K. M., Sodetz, J. M., & Sims, P. J. (1995) J. Biol. Chem. 270,3483-3486]. These experiments suggested that the CD59 recognition domain was contained between residues 334 and 415 in human C9. By analyzing the species-selective lytic activity of recombinant C9 with chimeric substitutions internal to this segment, we now demonstrate that the site in human C9 uniquely recognized by CD59 is centered on those residues contained between C9 Cys359/Cys384, with an additional contribution by residues C-terminal to this segment. Consistent with its role as a CD59 recognition domain, CD59 specifically bound a human C9-derived peptide corresponding to residues 359-384, and antibody (Fab) raised against this C9-derived peptide inhibited the lytic activity of human MAC. Mutant human C9 in which Ala was substituted for Cys359/384 was found to express normal lytic activity and to be fully inhibited by CD59. This suggests that the intrachain Cys359/Cys384 disulfide bond within C9 is not required to maintain the conformation of this segment of C9 for interaction with CD59.
Schoenfeld, Ann-Kathrin; Lahrsen, Eric; Alban, Susanne
2016-01-01
The serpin C1 inhibitor (C1-INH) is the only regulator of classical complement activation as well as the major regulator of the contact system. Its importance is demonstrated by hereditary angioedema (HAE), a severe disease with potentially life-threatening attacks due to deficiency or dysfunction of C1-INH. C1-INH replacement is the therapy of choice in HAE. In addition, C1-INH showed to have beneficial effects in other diseases characterized by inappropriate complement and contact system activation. Due to some limitations of its clinical application, there is a need for improving the efficacy of therapeutically applied C1-INH or to enhance the activity of endogenous C1-INH. Given the known potentiating effect of heparin on C1-INH, sulfated glycans (SG) may be such candidates. The aim of this study was to characterize suitable SG by evaluating structure-activity relationships. For this, more than 40 structurally distinct SG were examined for their effects on C1-INH, C1s and FXIIa. The SG turned out to potentiate the C1s inhibition by C1-INH without any direct influence on C1s. Their potentiating activity proved to depend on their degree of sulfation, molecular mass as well as glycan structure. In contrast, the SG had no effect on the FXIIa inhibition by C1-INH, but structure-dependently modulated the activity of FXIIa. Among the tested SG, β-1,3-glucan sulfates with a Mr ≤ 10 000 were identified as most promising lead candidates for the development of a glycan-based C1-INH amplifier. In conclusion, the obtained information on structural characteristics of SG favoring C1-INH potentiation represent an useful elementary basis for the development of compounds improving the potency of C1-INH in diseases and clinical situations characterized by inappropriate activation of complement and contact system. PMID:27783665
Herrmann, Johannes B.; Muenstermann, Marcel; Strobel, Lea; Schubert-Unkmeir, Alexandra; Woodruff, Trent M.; Klos, Andreas
2018-01-01
ABSTRACT Sepsis caused by Neisseria meningitidis (meningococcus) is a rapidly progressing, life-threatening disease. Because its initial symptoms are rather unspecific, medical attention is often sought too late, i.e., when the systemic inflammatory response is already unleashed. This in turn limits the success of antibiotic treatment. The complement system is generally accepted as the most important innate immune determinant against invasive meningococcal disease since it protects the host through the bactericidal membrane attack complex. However, complement activation concomitantly liberates the C5a peptide, and it remains unclear whether this potent anaphylatoxin contributes to protection and/or drives the rapidly progressing immunopathogenesis associated with meningococcal disease. Here, we dissected the specific contribution of C5a receptor 1 (C5aR1), the canonical receptor for C5a, using a mouse model of meningococcal sepsis. Mice lacking C3 or C5 displayed susceptibility that was enhanced by >1,000-fold or 100-fold, respectively, consistent with the contribution of these components to protection. In clear contrast, C5ar1−/− mice resisted invasive meningococcal infection and cleared N. meningitidis more rapidly than wild-type (WT) animals. This favorable outcome stemmed from an ameliorated inflammatory cytokine response to N. meningitidis in C5ar1−/− mice in both in vivo and ex vivo whole-blood infections. In addition, inhibition of C5aR1 signaling without interference with the complement bactericidal activity reduced the inflammatory response also in human whole blood. Enticingly, pharmacologic C5aR1 blockade enhanced mouse survival and lowered meningococcal burden even when the treatment was administered after sepsis induction. Together, our findings demonstrate that C5aR1 drives the pathophysiology associated with meningococcal sepsis and provides a promising target for adjunctive therapy. PMID:29362231
Immune response and histology of humoral rejection in kidney transplantation.
González-Molina, Miguel; Ruiz-Esteban, Pedro; Caballero, Abelardo; Burgos, Dolores; Cabello, Mercedes; Leon, Miriam; Fuentes, Laura; Hernandez, Domingo
2016-01-01
The adaptive immune response forms the basis of allograft rejection. Its weapons are direct cellular cytotoxicity, identified from the beginning of organ transplantation, and/or antibodies, limited to hyperacute rejection by preformed antibodies and not as an allogenic response. This resulted in allogenic response being thought for decades to have just a cellular origin. But the experimental studies by Gorer demonstrating tissue damage in allografts due to antibodies secreted by B lymphocytes activated against polymorphic molecules were disregarded. The special coexistence of binding and unbinding between antibodies and antigens of the endothelial cell membranes has been the cause of the delay in demonstrating the humoral allogenic response. The endothelium, the target tissue of antibodies, has a high turnover, and antigen-antibody binding is non-covalent. If endothelial cells are attacked by the humoral response, immunoglobulins are rapidly removed from their surface by shedding and/or internalization, as well as degrading the components of the complement system by the action of MCP, DAF and CD59. Thus, the presence of complement proteins in the membrane of endothelial cells is transient. In fact, the acute form of antibody-mediated rejection was not demonstrated until C4d complement fragment deposition was identified, which is the only component that binds covalently to endothelial cells. This review examines the relationship between humoral immune response and the types of acute and chronic histological lesion shown on biopsy of the transplanted organ. Copyright © 2016 Sociedad Española de Nefrología. Published by Elsevier España, S.L.U. All rights reserved.
The innate immune repertoire in cnidaria--ancestral complexity and stochastic gene loss.
Miller, David J; Hemmrich, Georg; Ball, Eldon E; Hayward, David C; Khalturin, Konstantin; Funayama, Noriko; Agata, Kiyokazu; Bosch, Thomas C G
2007-01-01
Characterization of the innate immune repertoire of extant cnidarians is of both fundamental and applied interest--it not only provides insights into the basic immunological 'tool kit' of the common ancestor of all animals, but is also likely to be important in understanding the global decline of coral reefs that is presently occurring. Recently, whole genome sequences became available for two cnidarians, Hydra magnipapillata and Nematostella vectensis, and large expressed sequence tag (EST) datasets are available for these and for the coral Acropora millepora. To better understand the basis of innate immunity in cnidarians, we scanned the available EST and genomic resources for some of the key components of the vertebrate innate immune repertoire, focusing on the Toll/Toll-like receptor (TLR) and complement pathways. A canonical Toll/TLR pathway is present in representatives of the basal cnidarian class Anthozoa, but neither a classic Toll/TLR receptor nor a conventional nuclear factor (NF)-kappaB could be identified in the anthozoan Hydra. Moreover, the detection of complement C3 and several membrane attack complex/perforin domain (MAC/PF) proteins suggests that a prototypic complement effector pathway may exist in anthozoans, but not in hydrozoans. Together with data for several other gene families, this implies that Hydra may have undergone substantial secondary gene loss during evolution. Such losses are not confined to Hydra, however, and at least one MAC/PF gene appears to have been lost from Nematostella. Consideration of these patterns of gene distribution underscores the likely significance of gene loss during animal evolution whilst indicating ancient origins for many components of the vertebrate innate immune system.
Evading the non-continuity equation in the f( R, T) cosmology
NASA Astrophysics Data System (ADS)
Moraes, P. H. R. S.; Correa, R. A. C.; Ribeiro, G.
2018-03-01
We present a new approach for the f( R, T) gravity formalism, by thoroughly exploring the extra terms of its effective energy-momentum tensor T_{μ ν }^eff, which we name \\tilde{T}_{μ ν }, so that T_{μ ν }^eff=T_{μ ν }+\\tilde{T}_{μ ν }, with T_{μ ν } being the usual energy-momentum tensor of matter. Purely from the Bianchi identities, we obtain the conservation of both parts of the effective energy-momentum tensor, rather than the non-conservation of T_{μ ν }, originally occurring in the f( R, T) theories. In this way, the intriguing scenario of matter creation, which still lacks observational evidence, is evaded. One is left, then, with two sets of cosmological equations to be solved: the Friedmann-like equations along with the conservation of T_{μ ν } and along with the conservation of \\tilde{T}_{μ ν }. We present a physical interpretation for the conservation of \\tilde{T}_{μ ν }, which can be related to the presence of stiff matter in the universe. The cosmological consequences of this approach are presented and discussed as well as the benefits of evading the matter energy-momentum tensor non-conservation.
A three-state kinetic agent-based model to analyze tax evasion dynamics
NASA Astrophysics Data System (ADS)
Crokidakis, Nuno
2014-11-01
In this work we study the problem of tax evasion on a fully-connected population. For this purpose, we consider that the agents may be in three different states, namely honest tax payers, tax evaders and undecided, that are individuals in an intermediate class among honests and evaders. Every individual can change his/her state following a kinetic exchange opinion dynamics, where the agents interact by pairs with competitive negative (with probability q) and positive (with probability 1-q) couplings, representing agreement/disagreement between pairs of agents. In addition, we consider the punishment rules of the Zaklan econophysics model, for which there is a probability pa of an audit each agent is subject to in every period and a length of time k detected tax evaders remain honest. Our results suggest that below the critical point qc=1/4 of the opinion dynamics the compliance is high, and the punishment rules have a small effect in the population. On the other hand, for q>qc the tax evasion can be considerably reduced by the enforcement mechanism. We also discuss the impact of the presence of the undecided agents in the evolution of the system.
Tse, Longping Victor; Klinc, Kelli A; Madigan, Victoria J; Castellanos Rivera, Ruth M; Wells, Lindsey F; Havlik, L Patrick; Smith, J Kennon; Agbandje-McKenna, Mavis; Asokan, Aravind
2017-06-13
Preexisting neutralizing antibodies (NAbs) against adeno-associated viruses (AAVs) pose a major, unresolved challenge that restricts patient enrollment in gene therapy clinical trials using recombinant AAV vectors. Structural studies suggest that despite a high degree of sequence variability, antibody recognition sites or antigenic hotspots on AAVs and other related parvoviruses might be evolutionarily conserved. To test this hypothesis, we developed a structure-guided evolution approach that does not require selective pressure exerted by NAbs. This strategy yielded highly divergent antigenic footprints that do not exist in natural AAV isolates. Specifically, synthetic variants obtained by evolving murine antigenic epitopes on an AAV serotype 1 capsid template can evade NAbs without compromising titer, transduction efficiency, or tissue tropism. One lead AAV variant generated by combining multiple evolved antigenic sites effectively evades polyclonal anti-AAV1 neutralizing sera from immunized mice and rhesus macaques. Furthermore, this variant displays robust immune evasion in nonhuman primate and human serum samples at dilution factors as high as 1:5, currently mandated by several clinical trials. Our results provide evidence that antibody recognition of AAV capsids is conserved across species. This approach can be applied to any AAV strain to evade NAbs in prospective patients for human gene therapy.
High Assurance Control of Cyber-Physical Systems with Application to Unmanned Aircraft Systems
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
With recent progress in the networked embedded control technology, cyber attacks have become one of the major threats to Cyber-Physical Systems (CPSs) due to their close integration of physical processes, computational resources, and communication capabilities. While CPSs have various applications in both military and civilian uses, their on-board automation and communication afford significant advantages over a system without such abilities, but these benefits come at the cost of possible vulnerability to cyber attacks. Traditionally, most cyber security studies in CPSs are mainly based on the computer security perspective, focusing on issues such as the trustworthiness of data flow, without rigorously considering the system's physical processes such as real-time dynamic behaviors. While computer security components are key elements in the hardware/software layer, these methods alone are not sufficient for diagnosing the healthiness of the CPSs' physical behavior. In seeking to address this problem, this research work proposes a control theoretic perspective approach which can accurately represent the interactions between the physical behavior and the logical behavior (computing resources) of the CPS. Then a controls domain aspect is explored extending beyond just the logical process of the CPS to include the underlying physical behavior. This approach will allow the CPS whose physical operations are robust/resilient to the damage caused by cyber attacks, successfully complementing the existing CPS security architecture. It is important to note that traditional fault-tolerant/robust control methods could not be directly applicable to achieve resiliency against malicious cyber attacks which can be designed sophisticatedly to spoof the security/safety monitoring system (note this is different from common faults). Thus, security issues at this layer require different risk management to detect cyber attacks and mitigate their impact within the context of a unified physical and logical process model of the CPS. Specifically, three main tasks are discussed in this presentation: (i) we first investigate diverse granularity of the interactions inside the CPS and propose feasible cyber attack models to characterize the compromised behavior of the CPS with various measures, from its severity to detectability; (ii) based on this risk information, our approach to securing the CPS addresses both monitoring of and high assurance control design against cyber attacks by developing on-line safety assessment and mitigation algorithms; and (iii) by extending the developed theories and methods from a single CPS to multiple CPSs, we examine the security and safety of multi-CPS network that are strongly dependent on the network topology, cooperation protocols between individual CPSs, etc. The effectiveness of the analytical findings is demonstrated and validated with illustrative examples, especially unmanned aircraft system (UAS) applications.
Estimation of weapon-radius versus maneuverability trade-off for air-to-air combat
NASA Technical Reports Server (NTRS)
Kelley, H. J.; Lefton, L.
1977-01-01
A chase in a horizontal plane between a pursuer with a large capture radius and a more maneuverable evading vehicle is examined with constant-speed vehicle models. An approximation to the 'sidestepping' maneuver of the Homicidal Chauffeur Game is modified to account for the effect of evader turning rate, and an estimate of capture radius required is so obtained which agrees remarkably well with Cockayne's point-capture result. The maneuver assumes central importance for barrier surfaces appearing in the Game of Two Cars. Results are given for required weapon capture-radius in terms of the maneuverability of the two vehicles. Some calculations of capture radius are presented.
Antibody blocks acquisition of bacterial colonization through agglutination
Roche, A. M.; Richard, A. L.; Rahkola, J. T.; Janoff, E. N.; Weiser, J. N.
2014-01-01
Invasive infection often begins with asymptomatic colonization of mucosal surfaces. A murine model of bacterial colonization with Streptococcus pneumoniae was used to study the mechanism for mucosal protection by immunoglobulin. In previously colonized immune mice, bacteria were rapidly sequestered within large aggregates in the nasal lumen. To further examine the role of bacterial agglutination in protection by specific antibodies, mice were passively immunized with IgG purified from anti-pneumococcal sera or pneumococcal type-specific monoclonal human IgA (hIgA1 or hIgA2). Systemically-delivered IgG accessed the mucosal surface and blocked acquisition of colonization and transmission between littermates. Optimal protection by IgG was independent of Fc fragment and complement and, therefore, did not involve an opsonophagocytic mechanism. Enzymatic digestion or reduction of IgG prior to administration showed that protection required divalent binding that maintained its agglutinating effect. Divalent hIgA1 is cleaved by the pneumococcal member of a family of bacterial proteases that generate monovalent Fabα fragments. Thus, passive immunization with hIgA1 blocked colonization by an IgA1-protease deficient mutant (agglutinated), but not the protease-producing wild-type parent (not agglutinated), whereas protease-resistant hIgA2 agglutinated and blocked colonization by both. Our findings highlight the importance of agglutinating antibodies in mucosal defense and reveal how successful pathogens evade this effect. PMID:24962092
Interaction of microbial agents with the immune system during infectious disease.
Frøland, S S
1984-01-01
Research during the last years has revealed a considerable complexity of the immune system. It is clear that immunological reactions depend on extensive and only partly clarified interactions between a number of different cell types (e.g. B lymphocytes, plasma cells, T cell subpopulations, cytotoxic K and NK cells, monocytic cells, neutrophilic and eosinophilic granulocytes) and their molecular products (e.g. immunoglobulins, lymphokines and interleukins). These components further interact with the complement system, as well as with immunologically nonspecific components like acute phase proteins (e.g. C-reactive protein) and with other pathophysiological phenomena occurring during infections, e.g. the fever response. The application of these observations from basic and experimental immunology to the investigation of antimicrobial immune reactions is still only in its beginning, but has already resulted in new concepts of clinical value for the understanding of infectious diseases. The present paper briefly describes certain aspects of the immune response to infections with various microbial agents, with particular emphasis on reactions of clinical importance. In addition to B and T cell reactions, possible antimicrobial functions of K cells and NK cells are discussed, and the possible importance in infectious disease of various T cell subpopulations, particularly T suppressor cells, is discussed. Lastly, various escape mechanisms are mentioned whereby certain microbial agents may evade elimination by the immune response of the host.
HIV-1 Nef sequesters MHC-I intracellularly by targeting early stages of endocytosis and recycling
Dirk, Brennan S.; Pawlak, Emily N.; Johnson, Aaron L.; Van Nynatten, Logan R.; Jacob, Rajesh A.; Heit, Bryan; Dikeakos, Jimmy D.
2016-01-01
A defining characteristic of HIV-1 infection is the ability of the virus to persist within the host. Specifically, MHC-I downregulation by the HIV-1 accessory protein Nef is of critical importance in preventing infected cells from cytotoxic T-cell mediated killing. Nef downregulates MHC-I by modulating the host membrane trafficking machinery, resulting in the endocytosis and eventual sequestration of MHC-I within the cell. In the current report, we utilized the intracellular protein-protein interaction reporter system, bimolecular fluorescence complementation (BiFC), in combination with super-resolution microscopy, to track the Nef/MHC-I interaction and determine its subcellular localization in cells. We demonstrate that this interaction occurs upon Nef binding the MHC-I cytoplasmic tail early during endocytosis in a Rab5-positive endosome. Disruption of early endosome regulation inhibited Nef-dependent MHC-I downregulation, demonstrating that Nef hijacks the early endosome to sequester MHC-I within the cell. Furthermore, super-resolution imaging identified that the Nef:MHC-I BiFC complex transits through both early and late endosomes before ultimately residing at the trans-Golgi network. Together we demonstrate the importance of the early stages of the endocytic network in the removal of MHC-I from the cell surface and its re-localization within the cell, which allows HIV-1 to optimally evade host immune responses. PMID:27841315
Mauck, Kerry E.; De Moraes, Consuelo M.; Mescher, Mark C.
2015-01-01
Plant viruses can profoundly alter the phenotypes of their host plants, with potentially far-reaching implications for ecology. Yet few studies have explored the indirect, host-mediated, effects of plant viruses on non-vector insects. We examined how infection of Cucurbita pepo plants by Cucumber mosaic virus (CMV) impacted the susceptibility of aphids (Myzus persicae) to attack by the parasitoid wasp Aphidius colemani. In semi-natural foraging assays, we observed higher rates of aphid parasitism on infected plants compared to healthy plants. Subsequent experiments revealed that this difference is not explained by different attack rates on plants differing in infection status, but rather by the fact that parasitoid larvae successfully complete their development more often when aphid hosts feed on infected plants. This suggests that the reduced nutritional quality of infected plants as host for aphids—documented in previous studies—compromises their ability to mount effective defenses against parasitism. Furthermore, our current findings indicate that the aphid diet during parasitoid development (rather than prior to wasp oviposition) is a key factor influencing resistance. These findings complement our previous work showing that CMV-induced changes in host plant chemistry alter patterns of aphid recruitment and dispersal in ways conducive to virus transmission. PMID:26043237
Posman, Kevin M; DeRito, Christopher M; Madsen, Eugene L
2017-02-15
Investigations of environmental microbial communities are crucial for the discovery of populations capable of degrading hazardous compounds and may lead to improved bioremediation strategies. The goal of this study was to identify microorganisms responsible for aerobic benzene degradation in coal tar-contaminated groundwater. Benzene degradation was monitored in laboratory incubations of well waters using gas chromatography mass spectrometry (GC-MS). Stable isotope probing (SIP) experiments using [ 13 C]benzene enabled us to obtain 13 C-labled community DNA. From this, 16S rRNA clone libraries identified Gammaproteobacteria and Betaproteobacteria as the active benzene-metabolizing microbial populations. Subsequent cultivation experiments yielded nine bacterial isolates that grew in the presence of benzene; five were confirmed in laboratory cultures to grow on benzene. The isolated benzene-degrading organisms were genotypically similar (>97% 16S rRNA gene nucleotide identities) to the organisms identified in SIP experiments. One isolate, Variovorax MAK3, was further investigated for the expression of a putative aromatic ring-hydroxylating dioxygenase (RHD) hypothesized to be involved in benzene degradation. Microcosm experiments using Variovorax MAK3 revealed a 10-fold increase in RHD (Vapar_5383) expression, establishing a link between this gene and benzene degradation. Furthermore, the addition of Variovorax MAK3 to microcosms prepared from site waters accelerated community benzene degradation and correspondingly increased RHD gene expression. In microcosms using uninoculated groundwater, quantitative (q)PCR assays (with 16S rRNA and RDH genes) showed that Variovorax was present and responsive to added benzene. These data demonstrate how the convergence of cultivation-dependent and -independent techniques can boost understandings of active populations and functional genes in complex benzene-degrading microbial communities. Benzene is a human carcinogen whose presence in contaminated groundwater drives environmental cleanup efforts. Although the aerobic biodegradation of benzene has long been established, knowledge of the identity of the microorganisms in complex naturally occurring microbial communities responsible for benzene biodegradation has evaded scientific inquiry for many decades. Here, we applied a molecular biology technique known as stable isotope probing (SIP) to the microbial communities residing in contaminated groundwater samples to identify the community members active in benzene biodegradation. We complemented this approach by isolating and growing in the laboratory a bacterium representative of the bacteria found using SIP. Further characterization of the isolated bacterium enabled us to track the expression of a key gene that attacks benzene both in pure cultures of the bacterium and in the naturally occurring groundwater microbial community. This work advances information regarding the documentation of microbial processes, especially the populations and genes that contribute to bioremediation. Copyright © 2017 American Society for Microbiology.
Posman, Kevin M.; DeRito, Christopher M.
2016-01-01
ABSTRACT Investigations of environmental microbial communities are crucial for the discovery of populations capable of degrading hazardous compounds and may lead to improved bioremediation strategies. The goal of this study was to identify microorganisms responsible for aerobic benzene degradation in coal tar-contaminated groundwater. Benzene degradation was monitored in laboratory incubations of well waters using gas chromatography mass spectrometry (GC-MS). Stable isotope probing (SIP) experiments using [13C]benzene enabled us to obtain 13C-labled community DNA. From this, 16S rRNA clone libraries identified Gammaproteobacteria and Betaproteobacteria as the active benzene-metabolizing microbial populations. Subsequent cultivation experiments yielded nine bacterial isolates that grew in the presence of benzene; five were confirmed in laboratory cultures to grow on benzene. The isolated benzene-degrading organisms were genotypically similar (>97% 16S rRNA gene nucleotide identities) to the organisms identified in SIP experiments. One isolate, Variovorax MAK3, was further investigated for the expression of a putative aromatic ring-hydroxylating dioxygenase (RHD) hypothesized to be involved in benzene degradation. Microcosm experiments using Variovorax MAK3 revealed a 10-fold increase in RHD (Vapar_5383) expression, establishing a link between this gene and benzene degradation. Furthermore, the addition of Variovorax MAK3 to microcosms prepared from site waters accelerated community benzene degradation and correspondingly increased RHD gene expression. In microcosms using uninoculated groundwater, quantitative (q)PCR assays (with 16S rRNA and RDH genes) showed that Variovorax was present and responsive to added benzene. These data demonstrate how the convergence of cultivation-dependent and -independent techniques can boost understandings of active populations and functional genes in complex benzene-degrading microbial communities. IMPORTANCE Benzene is a human carcinogen whose presence in contaminated groundwater drives environmental cleanup efforts. Although the aerobic biodegradation of benzene has long been established, knowledge of the identity of the microorganisms in complex naturally occurring microbial communities responsible for benzene biodegradation has evaded scientific inquiry for many decades. Here, we applied a molecular biology technique known as stable isotope probing (SIP) to the microbial communities residing in contaminated groundwater samples to identify the community members active in benzene biodegradation. We complemented this approach by isolating and growing in the laboratory a bacterium representative of the bacteria found using SIP. Further characterization of the isolated bacterium enabled us to track the expression of a key gene that attacks benzene both in pure cultures of the bacterium and in the naturally occurring groundwater microbial community. This work advances information regarding the documentation of microbial processes, especially the populations and genes that contribute to bioremediation. PMID:27913419
Pathogenic Leptospira Species Acquire Factor H and Vitronectin via the Surface Protein LcpA
da Silva, Ludmila Bezerra; Miragaia, Lidia dos Santos; Breda, Leandro Carvalho Dantas; Abe, Cecilia Mari; Schmidt, Mariana Costa Braga; Moro, Ana Maria; Monaris, Denize; Conde, Jonas Nascimento; Józsi, Mihály; Isaac, Lourdes; Abreu, Patrícia Antônia Estima
2014-01-01
Upon infection, pathogenic Leptospira species bind several complement regulators in order to overcome host innate immunity. We previously characterized a 20-kDa leptospiral surface protein which interacts with C4b binding protein (C4BP): leptospiral complement regulator-acquiring protein A (LcpA). Here we show that LcpA also interacts with human factor H (FH), which remains functionally active once bound to the protein. Antibodies directed against short consensus repeat 20 (SCR20) inhibited binding of FH to LcpA by approximately 90%, thus confirming that this particular domain is involved in the interaction. We have also shown for the first time that leptospires bind human vitronectin and that the interaction is mediated by LcpA. Coincubation with heparin blocked LcpA-vitronectin interaction in a dose-dependent manner, strongly suggesting that binding may occur through the heparin binding domains of vitronectin. LcpA also bound to the terminal pathway component C9 and inhibited Zn2+-induced polymerization and membrane attack complex (MAC) formation. Competitive binding assays indicated that LcpA interacts with C4BP, FH, and vitronectin through distinct sites. Taken together, our findings indicate that LcpA may play a role in leptospiral immune evasion. PMID:25534939
Pathogenic Leptospira species acquire factor H and vitronectin via the surface protein LcpA.
da Silva, Ludmila Bezerra; Miragaia, Lidia Dos Santos; Breda, Leandro Carvalho Dantas; Abe, Cecilia Mari; Schmidt, Mariana Costa Braga; Moro, Ana Maria; Monaris, Denize; Conde, Jonas Nascimento; Józsi, Mihály; Isaac, Lourdes; Abreu, Patrícia Antônia Estima; Barbosa, Angela Silva
2015-03-01
Upon infection, pathogenic Leptospira species bind several complement regulators in order to overcome host innate immunity. We previously characterized a 20-kDa leptospiral surface protein which interacts with C4b binding protein (C4BP): leptospiral complement regulator-acquiring protein A (LcpA). Here we show that LcpA also interacts with human factor H (FH), which remains functionally active once bound to the protein. Antibodies directed against short consensus repeat 20 (SCR20) inhibited binding of FH to LcpA by approximately 90%, thus confirming that this particular domain is involved in the interaction. We have also shown for the first time that leptospires bind human vitronectin and that the interaction is mediated by LcpA. Coincubation with heparin blocked LcpA-vitronectin interaction in a dose-dependent manner, strongly suggesting that binding may occur through the heparin binding domains of vitronectin. LcpA also bound to the terminal pathway component C9 and inhibited Zn(2+)-induced polymerization and membrane attack complex (MAC) formation. Competitive binding assays indicated that LcpA interacts with C4BP, FH, and vitronectin through distinct sites. Taken together, our findings indicate that LcpA may play a role in leptospiral immune evasion. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
Trichinella spiralis: killing of newborn larvae by lung cells.
Falduto, Guido H; Vila, Cecilia C; Saracino, María P; Calcagno, Marcela A; Venturiello, Stella M
2015-02-01
The migratory stage of Trichinella spiralis, the newborn larva (NBL), travels along the pulmonary microvascular system on its way to the skeletal muscle cells. The present work studies the capability of lung cells to kill NBL. For this purpose, in vitro cytotoxicity assays were performed using NBL, lung cell suspensions from Wistar rats, rat anti-NBL surface sera, and fresh serum as complement source. The cytotoxic activity of lung cells from rats infected on day 6 p.i. was compared with that from noninfected rats. Two and 20 h-old NBL (NBL2 and NBL20) were used as they had shown to exhibit different surface antigens altering their biological activity. Sera antibodies were analyzed by indirect immunofluorescence assay, and cell populations used in each assay were characterized by histological staining. The role of IgE in the cytotoxic attack against NBL was analyzed using heated serum. The FcεRI expression on cell suspensions was examined by flow cytometry. Results showed that lung cells were capable of killing NBL by antibody-dependent cell-mediated cytotoxicity (ADCC). Lung cells from infected animals yielded the highest mortality percentages of NBL, with NBL20 being the most susceptible to such attack. IgE yielded a critical role in the cytotoxic attack. Regarding the analysis of cell suspensions, cells from infected rats showed an increase in the percentage of eosinophils, neutrophils, and the number of cells expressing the FcεRI receptor. We conclude that lung cells are capable of killing NBL in the presence of specific antibodies, supporting the idea that the lung is one of the sites where the NBL death occurs due to ADCC.
György, Bence; Fitzpatrick, Zachary; Crommentuijn, Matheus HW; Mu, Dakai; Maguire, Casey A.
2014-01-01
Recently adeno-associated virus (AAV) became the first clinically approved gene therapy product in the western world. To develop AAV for future clinical application in a widespread patient base, particularly in therapies which require intravenous (i.v.) administration of vector, the virus must be able to evade pre-existing antibodies to the wild type virus. Here we demonstrate that in mice, AAV vectors associated with extracellular vesicles (EVs) can evade human anti-AAV neutralizing antibodies. We observed different antibody evasion and gene transfer abilities with populations of EVs isolated by different centrifugal forces. EV-associated AAV vector (ev-AAV) was up to 136-fold more resistant over a range of neutralizing antibody concentrations relative to standard AAV vector in vitro. Importantly in mice, at a concentration of passively transferred human antibodies which decreased i.v. administered standard AAV transduction of brain by 80%, transduction of ev-AAV transduction was not reduced and was 4,000-fold higher. Finally, we show that expressing a brain targeting peptide on the EV surface allowed significant enhancement of transduction compared to untargeted ev-AAV. Using ev-AAV represents an effective, clinically relevant approach to evade human neutralizing anti-AAV antibodies after systemic administration of vector. PMID:24917028
Hybrid Wing Body Model Identification Using Forced-Oscillation Water Tunnel Data
NASA Technical Reports Server (NTRS)
Murphy, Patrick C.; Vicroy, Dan D.; Kramer, Brian; Kerho, Michael
2014-01-01
Static and dynamic testing of the NASA 0.7 percent scale Hybrid Wing Body (HWB) configuration was conducted in the Rolling Hills Research Corporation water tunnel to investigate aerodynamic behavior over a large range of angle-of-attack and to develop models that can predict aircraft response in nonlinear unsteady flight regimes. This paper reports primarily on the longitudinal axis results. Flow visualization tests were also performed. These tests provide additional static data and new dynamic data that complement tests conducted at NASA Langley 14- by 22-Foot Subsonic Tunnel. HWB was developed to support the NASA Environmentally Responsible Aviation Project goals of lower noise, emissions, and fuel burn. This study also supports the NASA Aviation Safety Program efforts to model and control advanced transport configurations in loss-of-control conditions.
Bhattacharjee, Arnab; Reuter, Stefanie; Trojnár, Eszter; Kolodziejczyk, Robert; Seeberger, Harald; Hyvärinen, Satu; Uzonyi, Barbara; Szilágyi, Ágnes; Prohászka, Zoltán; Goldman, Adrian; Józsi, Mihály; Jokiranta, T Sakari
2015-04-10
Atypical hemolytic uremic syndrome (aHUS) is characterized by complement attack against host cells due to mutations in complement proteins or autoantibodies against complement factor H (CFH). It is unknown why nearly all patients with autoimmune aHUS lack CFHR1 (CFH-related protein-1). These patients have autoantibodies against CFH domains 19 and 20 (CFH19-20), which are nearly identical to CFHR1 domains 4 and 5 (CFHR14-5). Here, binding site mapping of autoantibodies from 17 patients using mutant CFH19-20 constructs revealed an autoantibody epitope cluster within a loop on domain 20, next to the two buried residues that are different in CFH19-20 and CFHR14-5. The crystal structure of CFHR14-5 revealed a difference in conformation of the autoantigenic loop in the C-terminal domains of CFH and CFHR1, explaining the variation in binding of autoantibodies from some aHUS patients to CFH19-20 and CFHR14-5. The autoantigenic loop on CFH seems to be generally flexible, as its conformation in previously published structures of CFH19-20 bound to the microbial protein OspE and a sialic acid glycan is somewhat altered. Cumulatively, our data suggest that association of CFHR1 deficiency with autoimmune aHUS could be due to the structural difference between CFHR1 and the autoantigenic CFH epitope, suggesting a novel explanation for CFHR1 deficiency in the pathogenesis of autoimmune aHUS. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.
Luo, Shanshan; Hipler, Uta-Christina; Münzberg, Christin; Skerka, Christine; Zipfel, Peter F
2015-01-01
Candida albicans, the important human fungal pathogen uses multiple evasion strategies to control, modulate and inhibit host complement and innate immune attack. Clinical C. albicans strains vary in pathogenicity and in serum resistance, in this work we analyzed sequence polymorphisms and variations in the expression levels of two central fungal complement evasion proteins, Gpm1 (phosphoglycerate mutase 1) and Pra1 (pH-regulated antigen 1) in thirteen clinical C. albicans isolates. Four nucleotide (nt) exchanges, all representing synonymous exchanges, were identified within the 747-nt long GPM1 gene. For the 900-nt long PRA1 gene, sixteen nucleotide exchanges were identified, which represented synonymous, as well as non-synonymous exchanges. All thirteen clinical isolates had a homozygous exchange (A to G) at position 73 of the PRA1 gene. Surface levels of Gpm1 varied by 8.2, and Pra1 levels by 3.3 fold in thirteen tested isolates and these differences influenced fungal immune fitness. The high Gpm1/Pra1 expressing candida strains bound the three human immune regulators more efficiently, than the low expression strains. The difference was 44% for Factor H binding, 51% for C4BP binding and 23% for plasminogen binding. This higher Gpm1/Pra1 expressing strains result in enhanced survival upon challenge with complement active, Factor H depleted human serum (difference 40%). In addition adhesion to and infection of human endothelial cells was increased (difference 60%), and C3b surface deposition was less effective (difference 27%). Thus, variable expression levels of central immune evasion protein influences immune fitness of the human fungal pathogen C. albicans and thus contribute to fungal virulence.
The innate immune repertoire in Cnidaria - ancestral complexity and stochastic gene loss
Miller, David J; Hemmrich, Georg; Ball, Eldon E; Hayward, David C; Khalturin, Konstantin; Funayama, Noriko; Agata, Kiyokazu; Bosch, Thomas CG
2007-01-01
Background Characterization of the innate immune repertoire of extant cnidarians is of both fundamental and applied interest - it not only provides insights into the basic immunological 'tool kit' of the common ancestor of all animals, but is also likely to be important in understanding the global decline of coral reefs that is presently occurring. Recently, whole genome sequences became available for two cnidarians, Hydra magnipapillata and Nematostella vectensis, and large expressed sequence tag (EST) datasets are available for these and for the coral Acropora millepora. Results To better understand the basis of innate immunity in cnidarians, we scanned the available EST and genomic resources for some of the key components of the vertebrate innate immune repertoire, focusing on the Toll/Toll-like receptor (TLR) and complement pathways. A canonical Toll/TLR pathway is present in representatives of the basal cnidarian class Anthozoa, but neither a classic Toll/TLR receptor nor a conventional nuclear factor (NF)-κB could be identified in the anthozoan Hydra. Moreover, the detection of complement C3 and several membrane attack complex/perforin domain (MAC/PF) proteins suggests that a prototypic complement effector pathway may exist in anthozoans, but not in hydrozoans. Together with data for several other gene families, this implies that Hydra may have undergone substantial secondary gene loss during evolution. Such losses are not confined to Hydra, however, and at least one MAC/PF gene appears to have been lost from Nematostella. Conclusion Consideration of these patterns of gene distribution underscores the likely significance of gene loss during animal evolution whilst indicating ancient origins for many components of the vertebrate innate immune system. PMID:17437634
How type 1 fimbriae help Escherichia coli to evade extracellular antibiotics.
Avalos Vizcarra, Ima; Hosseini, Vahid; Kollmannsberger, Philip; Meier, Stefanie; Weber, Stefan S; Arnoldini, Markus; Ackermann, Martin; Vogel, Viola
2016-01-05
To survive antibiotics, bacteria use two different strategies: counteracting antibiotic effects by expression of resistance genes or evading their effects e.g. by persisting inside host cells. Since bacterial adhesins provide access to the shielded, intracellular niche and the adhesin type 1 fimbriae increases bacterial survival chances inside macrophages, we asked if fimbriae also influenced survival by antibiotic evasion. Combined gentamicin survival assays, flow cytometry, single cell microscopy and kinetic modeling of dose response curves showed that type 1 fimbriae increased the adhesion and internalization by macrophages. This was caused by strongly decreased off-rates and affected the number of intracellular bacteria but not the macrophage viability and morphology. Fimbriae thus promote antibiotic evasion which is particularly relevant in the context of chronic infections.
An update for atypical haemolytic uraemic syndrome: diagnosis and treatment. A consensus document.
Campistol, Josep M; Arias, Manuel; Ariceta, Gema; Blasco, Miguel; Espinosa, Laura; Espinosa, Mario; Grinyó, Josep M; Macía, Manuel; Mendizábal, Santiago; Praga, Manuel; Román, Elena; Torra, Roser; Valdés, Francisco; Vilalta, Ramón; Rodríguez de Córdoba, Santiago
2015-01-01
Haemolytic uraemic syndrome (HUS) is a clinical entity defined as the triad of nonimmune haemolytic anaemia, thrombocytopenia, and acute renal failure, in which the underlying lesions are mediated by systemic thrombotic microangiopathy (TMA). Different causes can induce the TMA process that characterizes HUS. In this document we consider atypical HUS (aHUS) a sub-type of HUS in which the TMA phenomena are the consequence of the endotelial damage in the microvasculature of the kidneys and other organs due to a disregulation of the activity of the complement system. In recent years, a variety of aHUs-related mutations have been identified in genes of the the complement system, which can explain approximately 60% of the aHUS cases, and a number of mutations and polymorphisms have been functionally characterized. These findings have stablished that aHUS is a consequence of the insufficient regulation of the activiation of the complement on cell surfaces, leading to endotelial damage mediated by C5 and the complement terminal pathway. Eculizumab is a monoclonal antibody that inhibits the activation of C5 and blocks the generation of the pro-inflammatory molecule C5a and the formation of the cell membrane attack complex. In prospective studies in patients with aHUS, the use of Eculizumab has shown a fast and sustained interruption of the TMA process and it has been associated with significative long-term improvements in renal function, the interruption of plasma therapy and important reductions in the need of dialysis. According to the existing literature and the accumulated clinical experience, the Spanish aHUS Group published a consensus document with recommendations for the treatment of aHUs (Nefrologia 2013;33[1]:27-45). In the current online version of this document, we update the aetiological classification of TMAs, the pathophysiology of aHUS, its differential diagnosis and its therapeutic management. Copyright © 2015 Sociedad Española de Nefrología. Published by Elsevier España, S.L.U. All rights reserved.
HTLV-1 Tax impairs K63-linked ubiquitination of STING to evade host innate immunity.
Wang, Jie; Yang, Shuai; Liu, Lu; Wang, Hui; Yang, Bo
2017-03-15
The cellular antiviral innate immune system is essential for host defense and viruses have evolved a variety of strategies to evade the innate immunity. Human T lymphotropic virus type 1 (HTLV-1) belongs to the deltaretrovirus family and it can establish persistent infection in human beings for many years. However, how this virus evades the host innate immune responses remains unclear. Here we report a new strategy used by HTLV-1 to block innate immune responses. We observed that stimulator of interferon genes (STING) limited HTLV-1 protein expression and was critical to HTLV-1 reverse transcription intermediate (RTI) ssDNA90 triggered interferon (IFN)-β production in phorbol12-myristate13-acetate (PMA)-differentiated THP1 (PMA-THP1) cells. The HTLV-1 protein Tax inhibited STING overexpression induced transcriptional activation of IFN-β. Tax also impaired poly(dA:dT), interferon stimulatory DNA (ISD) or cyclic GMP-AMP (cGAMP) -stimulated IFN-β production, which was dependent on STING activation. Coimmunoprecipitation assays and confocal microscopy indicated that Tax was associated with STING in the same complex. Mechanistic studies suggested that Tax decreased the K63-linked ubiquitination of STING and disrupted the interactions between STING and TANK-binding kinase 1 (TBK1). These findings may shed more light on the molecular mechanisms underlying HTLV-1 infection. Copyright © 2017 Elsevier B.V. All rights reserved.
[Blood endotoxin in acute pancreatitis using limulus amebocyte lysate test (LAL test)].
Pierrakakis, S; Xepapadakis, G; Mega, A M; Megas, T; Katergiannakis, V G; Perpirakis, G; Filippakis, M
1990-03-15
Forty-five cases of acute pancreatitis observed during the period 1986-88 were included in this study. Four of the 45 patients were operated during the acute phase and of these, two died. The remaining 41 patients were treated with conservative therapy using the application of a nasogastric tube, analgesics, and the endovenous administration of various solutions and antibiotics. The severity of each attack of pancreatitis was assessed according to Ranson and Agarwal's criteria. In severe cases (more than 3 of Ranson's criteria) the presence of endotoxin in the systemic circulation was shown using the "limulus" method, together with contemporary low levels of C3 complement factor. As is evident from the results of the study, the presence of endotoxinemia and the low level of C3 in acute pancreatitis are related to the high percentage of complications.
AntBot: Anti-pollution peer-to-peer botnets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yan, Guanhua; Eidenbenz, Stephan; Ha, Duc T
2009-01-01
Botnets, which are responsible for many email sparnming and DDoS (Distributed Denial of Service) attacks in the current Internet, have emerged as one of most severe cyber-threats in recent years. To evade detection and improve resistance against countermeasures, botnets have evolved from the first generation that relies on IRC chat channels to deliver commands to the current generation that uses highly resilient P2P (Peer-to-Peer) protocols to spread their C&C (Command and Control) information. It is, however, revealed that P2P botnets, although relieved from the single point of failure that IRC botnets suffer, can be easily disrupted using pollution-based mitigation schemesmore » [15]. In this paper, we play the devil's advocate and propose a new type of hypothetical botnets called AntBot, which aim to propagate their C&C information to individual bots even though there exists an adversary that persistently pollutes keys used by seized bots to search the command information. The key idea of AntBot is a tree-like structure that bots use to deliver the command so that captured bots reveal only limited information. To evaluate effectiveness of AntBot against pollution-based mitigation in a virtual environment, we develop a distributed P2P botnet simulator. Using extensive experiments, we demonstrate that AntBot operates resiliently against pollution-based mitigation. We further present a few potential defense schemes that could effectively disrupt AntBot operations.« less
Immune-Checkpoint Blockade and Active Immunotherapy for Glioma
Ahn, Brian J.; Pollack, Ian F.; Okada, Hideho
2013-01-01
Cancer immunotherapy has made tremendous progress, including promising results in patients with malignant gliomas. Nonetheless, the immunological microenvironment of the brain and tumors arising therein is still believed to be suboptimal for sufficient antitumor immune responses for a variety of reasons, including the operation of “immune-checkpoint” mechanisms. While these mechanisms prevent autoimmunity in physiological conditions, malignant tumors, including brain tumors, actively employ these mechanisms to evade from immunological attacks. Development of agents designed to unblock these checkpoint steps is currently one of the most active areas of cancer research. In this review, we summarize recent progresses in the field of brain tumor immunology with particular foci in the area of immune-checkpoint mechanisms and development of active immunotherapy strategies. In the last decade, a number of specific monoclonal antibodies designed to block immune-checkpoint mechanisms have been developed and show efficacy in other cancers, such as melanoma. On the other hand, active immunotherapy approaches, such as vaccines, have shown encouraging outcomes. We believe that development of effective immunotherapy approaches should ultimately integrate those checkpoint-blockade agents to enhance the efficacy of therapeutic approaches. With these agents available, it is going to be quite an exciting time in the field. The eventual success of immunotherapies for brain tumors will be dependent upon not only an in-depth understanding of immunology behind the brain and brain tumors, but also collaboration and teamwork for the development of novel trials that address multiple layers of immunological challenges in gliomas. PMID:24202450
Wise, Michael J
2018-06-24
Despite the fact that herbivores can be highly detrimental to their host plants' fitness, plant populations often maintain genetic variation for resistance to their natural enemies. Investigating the various costs (e.g., allocation tradeoffs, autotoxicity, and ecological costs) that may prevent plants from evolving to their fullest potential resistance has been a productive strategy for shedding insight into the eco-evolutionary dynamics of plant-herbivore communities. Recent studies have shown that some individuals of goldenrod (Solidago spp.) evade apex-attacking herbivores by a temporary nodding of their stem (i.e., resistance-by-ducking). Although ducking provides an obvious fitness benefit to these individuals, nonducking (erect) morphs persist in goldenrod populations. In this study, I investigated potential costs of ducking in Solidago gigantea in terms of tradeoffs involving growth and reproduction in a common garden experiment using field-collected seeds. The S. gigantea population contained substantial genetic variation for stem morph, with 28% erect and 72% ducking stems. In the absence of herbivory, ducking plants were taller, had thicker stems, and produced an average of 20% more seeds than erect plants. This study suggests that resistance-by-ducking, instead of being costly, actually comes with additional, nondefense-related benefits. These results support the conclusion that the factors that constrain the evolution of resistance in plant populations are likely to be more subtle and complex than simple tradeoffs in resource allocation. © 2018 Botanical Society of America.
How type 1 fimbriae help Escherichia coli to evade extracellular antibiotics
Avalos Vizcarra, Ima; Hosseini, Vahid; Kollmannsberger, Philip; Meier, Stefanie; Weber, Stefan S.; Arnoldini, Markus; Ackermann, Martin; Vogel, Viola
2016-01-01
To survive antibiotics, bacteria use two different strategies: counteracting antibiotic effects by expression of resistance genes or evading their effects e.g. by persisting inside host cells. Since bacterial adhesins provide access to the shielded, intracellular niche and the adhesin type 1 fimbriae increases bacterial survival chances inside macrophages, we asked if fimbriae also influenced survival by antibiotic evasion. Combined gentamicin survival assays, flow cytometry, single cell microscopy and kinetic modeling of dose response curves showed that type 1 fimbriae increased the adhesion and internalization by macrophages. This was caused by strongly decreased off-rates and affected the number of intracellular bacteria but not the macrophage viability and morphology. Fimbriae thus promote antibiotic evasion which is particularly relevant in the context of chronic infections. PMID:26728082
Rubin, Erica J; Trent, M Stephen
2013-01-01
Helicobacter pylori is an adapted gastric pathogen that colonizes the human stomach, causing severe gastritis and gastric cancer. A hallmark of infection is the ability of this organism to evade detection by the human immune system. H. pylori has evolved a number of features to achieve this, many of which involve glyco-conjugates including the lipopolysaccharide, peptidoglycan layer, glycoproteins, and glucosylated cholesterol. These major bacterial components possess unique features from those of other gram-negative organisms, including differences in structure, assembly, and modification. These defining characteristics of H. pylori glycobiology help the pathogen establish a long-lived infection by providing camouflage, modulating the host immune response, and promoting virulence mechanisms. In this way, glyco-conjugates are essential for H. pylori pathogenicity and survival, allowing it to carve out a niche in the formidable environment of the human stomach. PMID:23859890
Parametric Fin-Body and Fin-Plate Database for a Series of 12 Missile Fins
NASA Technical Reports Server (NTRS)
Allen, Jerry M.
2001-01-01
A cooperative experimental investigation has been performed to obtain a systematic fin-body and fin-plate database for a series of 12 missile fins. These data are intended to complement and extend the information contained in the Triservice missile project and to provide a systematic set of experimental data from which fin-body interference factors can be derived. Data were obtained with the fins mounted on both an axisymmetric body and on a flat plate that was used to simulate fin-alone measurements. The experiments were conducted at Mach numbers from 0.60 to 3.95; fin deflection angles of 0 deg, 10 deg, and -10 deg; and angles of attack up to 30 deg on the body and up to 95 deg on the flat plate. The data were obtained from three-component balances attached to the fins and a six-component balance located in the axisymmetric body. The data obtained in this project are documented in tabular form in this report. In addition, selected data are presented in graphical form to illustrate the effects of the test variables. These variables are configuration angle of attack; Mach number; and fin parameters of deflection angle, planform size, taper ratio, and aspect ratio. A very limited comparison with the Triservice missile data is made to illustrate the consistency between the data from these two projects.
Spanwise visualization of the flow around a three-dimensional foil with leading edge protuberances
NASA Astrophysics Data System (ADS)
Stanway, M. J.; Techet, A. H.
2006-11-01
Studies of model humpback whale fins have shown that leading edge protuberances, or tubercles, can lead to delayed stall and increased lift at higher angles of attack, compared to foils with geometrically smooth leading edges. Such enhanced performance characteristics could prove highly useful in underwater vehicles such as gliders or long range AUVs (autonomous underwater vehicles). In this work, Particle Imaging Velocimetry (PIV) is performed on two static wings in a water tunnel over a range of angles of attack. These three- dimensional, finite-aspect ratio wings are modeled after a humpback whale flipper and are identical in shape, tapered from root to tip, except for the leading edge. In one of the foils the leading edge is smooth, whereas in the other, regularly spaced leading edge bumps are machined to simulate the whale’s fin tubercles. Results from these PIV tests reveal distinct cells where coherent flow structures are destroyed as a result of the leading edge perturbations. Tests are performed at Reynolds numbers Re ˜ O(10^5), based on chordlength, in a recirculating water tunnel. An inline six-axis load cell is mounted to measure the forces on the foil over a range of static pitch angles. It is hypothesized that this spanwise breakup of coherent vortical structures is responsible for the delayed angle of stall. These quantitative experiments complement exiting qualitative studies with two dimensional foils.
Dutta, Saheb; Choudhury, Kaberi; Banik, Sindrila Dutta; Nandi, Nilashis
2014-03-01
The present work is aimed at understanding the origin of the difference in the molecular organization of the active site nanospaces of the class I and class II aminoacyl tRNA synthetases (aaRSs) which are tunnel-like structures. The active site encloses the cognate amino acid (AA) and the adenosine triphosphate (ATP) to carry out aminoacylation reaction. Comparison of the structures of the active site of the class I and class II (aaRSs) shows that the nanodimensional tunnels are curved in opposite directions in the two classes. We investigated the origin of this difference using quantum mechanical computation of electrostatic potential (ESP) of substrates, surrounding residues and ions, using Atoms in Molecule (AIM) Theory and charge population analysis. We show that the difference is principally due to the variation in the spatial charge distribution of ATP in the two classes which correspond to extended and bent conformations of ATP. The present computation shows that the most feasible pathway for nucleophilic attack to alphaP is oppositely directed for class I and class II aaRSs. The available crystal structures show that the cognate AA is indeed located along the channel favorable for nucleophilic attack as predicted by the ESP analysis. It is also shown that the direction of the channel changes its orientation when the orientation of ATP is changed from extended to a bent like structure. We further used the AIM theory to confirm the direction of the approach of AA in each case and the results corroborate the results from the ESP analysis. The opposite curvatures of the active site nanospaces in class I and class II aaRSs are related with the influence of the charge distributions of the extended and bent conformations of ATP, respectively. The results of the computation of electrostatic potential by successive addition of active site residues show that their roles on the reaction are similar in both classes despite the difference in the organization of the active sites of class I and class II aaRSs. The difference in mechanism in two classes as pointed out in recent study (S. Dutta Banik and N. Nandi, J. Biomol. Struct. Dyn. 30, 701 (2012)) is related with the fact that the relative arrangement of the ATP with respect to the AA is opposite in class I and class II aaRSs as explained in the present work. The charge population difference between the reacting centers (which are the alphaP atom of ATP (q(p)) and the attacking oxygen atom of carboxylic acid group (q(o)), respectively) denoted by delta(q), is a measure of the propensity of nucleophilic attack. The population analysis of the substrate AA shows that a non-negligible difference exists between the attacking oxygens of AA in class I (syn) and in class II (anti) which is one reason for the lower value of delta(q) in class II relative to class I. The population analysis of the AA, ATP, Mg+2 ions and active site residues shows that the difference in delta(q) values of the two classes is substantially reduced. When ions and residues are considered. Thus, the bent state of ATP, Mg+2 ions and active site residues complements it cognate AA to carry out the nucleophilic reaction in class I as efficiently as occurs in class I (with the extended state of ATP, single Mg+2 ion and active site residues). This could be one reason for the two different conformations of ATP in the two classes. The mutual arrangements of AA and ATP in each aaRS are guided by the spatial charge distribution of ATP (extended and bent). The present work shows that the construction of nanospace complements the arrangement of the substrate (AA and ATP).
Park, Shin Yong; Kim, Kyoung Mi; Lee, Joon Ha; Seo, Sook Jae; Lee, In Hee
2007-01-01
We isolated Enterococcus faecalis from the body fluids of dead larvae of the greater wax moth, Galleria mellonella. Extracellular gelatinase (GelE) and serine protease (SprE), both of which are considered putative virulence factors of E. faecalis, were purified from the culture supernatant of E. faecalis. In an attempt to elucidate their virulence mechanisms, purified GelE and SprE were injected into hemolymph of G. mellonella and evaluated with regard to their effects on the immune system of insect hemolymph. As a result, it was determined that E. faecalis GelE degraded an inducible antimicrobial peptide (Gm cecropin) which is known to perform a critical role in host defense during the early phase of microbial infection. The results obtained from the G. mellonella-E. faecalis infection model compelled us to assess the virulence activity of GelE against the complement system in human serum. E. faecalis GelE hydrolyzed C3a and also mediated the degradation of the alpha chain of C3b, thereby inhibiting opsonization and the formation of the membrane attack complex resultant from the activation of the complement cascade triggered by C3 activation. In contrast, E. faecalis SprE exhibited no virulence effect against the immune system of insect hemolymph or human serum tested in this study. PMID:17261598
Interaction of the tick immune system with transmitted pathogens
Hajdušek, Ondřej; Šíma, Radek; Ayllón, Nieves; Jalovecká, Marie; Perner, Jan; de la Fuente, José; Kopáček, Petr
2013-01-01
Ticks are hematophagous arachnids transmitting a wide variety of pathogens including viruses, bacteria, and protozoans to their vertebrate hosts. The tick vector competence has to be intimately linked to the ability of transmitted pathogens to evade tick defense mechanisms encountered on their route through the tick body comprising midgut, hemolymph, salivary glands or ovaries. Tick innate immunity is, like in other invertebrates, based on an orchestrated action of humoral and cellular immune responses. The direct antimicrobial defense in ticks is accomplished by a variety of small molecules such as defensins, lysozymes or by tick-specific antimicrobial compounds such as microplusin/hebraein or 5.3-kDa family proteins. Phagocytosis of the invading microbes by tick hemocytes is likely mediated by the primordial complement-like system composed of thioester-containing proteins, fibrinogen-related lectins and convertase-like factors. Moreover, an important role in survival of the ingested microbes seems to be played by host proteins and redox balance maintenance in the tick midgut. Here, we summarize recent knowledge about the major components of tick immune system and focus on their interaction with the relevant tick-transmitted pathogens, represented by spirochetes (Borrelia), rickettsiae (Anaplasma), and protozoans (Babesia). Availability of the tick genomic database and feasibility of functional genomics based on RNA interference greatly contribute to the understanding of molecular and cellular interplay at the tick-pathogen interface and may provide new targets for blocking the transmission of tick pathogens. PMID:23875177
Mycobacterium tuberculosis Hip1 modulates macrophage responses through proteolysis of GroEL2.
Naffin-Olivos, Jacqueline L; Georgieva, Maria; Goldfarb, Nathan; Madan-Lala, Ranjna; Dong, Lauren; Bizzell, Erica; Valinetz, Ethan; Brandt, Gabriel S; Yu, Sarah; Shabashvili, Daniil E; Ringe, Dagmar; Dunn, Ben M; Petsko, Gregory A; Rengarajan, Jyothi
2014-05-01
Mycobacterium tuberculosis (Mtb) employs multiple strategies to evade host immune responses and persist within macrophages. We have previously shown that the cell envelope-associated Mtb serine hydrolase, Hip1, prevents robust macrophage activation and dampens host pro-inflammatory responses, allowing Mtb to delay immune detection and accelerate disease progression. We now provide key mechanistic insights into the molecular and biochemical basis of Hip1 function. We establish that Hip1 is a serine protease with activity against protein and peptide substrates. Further, we show that the Mtb GroEL2 protein is a direct substrate of Hip1 protease activity. Cleavage of GroEL2 is specifically inhibited by serine protease inhibitors. We mapped the cleavage site within the N-terminus of GroEL2 and confirmed that this site is required for proteolysis of GroEL2 during Mtb growth. Interestingly, we discovered that Hip1-mediated cleavage of GroEL2 converts the protein from a multimeric to a monomeric form. Moreover, ectopic expression of cleaved GroEL2 monomers into the hip1 mutant complemented the hyperinflammatory phenotype of the hip1 mutant and restored wild type levels of cytokine responses in infected macrophages. Our studies point to Hip1-dependent proteolysis as a novel regulatory mechanism that helps Mtb respond rapidly to changing host immune environments during infection. These findings position Hip1 as an attractive target for inhibition for developing immunomodulatory therapeutics against Mtb.
Mycobacterium tuberculosis Hip1 Modulates Macrophage Responses through Proteolysis of GroEL2
Madan-Lala, Ranjna; Dong, Lauren; Bizzell, Erica; Valinetz, Ethan; Brandt, Gabriel S.; Yu, Sarah; Shabashvili, Daniil E.; Ringe, Dagmar; Dunn, Ben M.; Petsko, Gregory A.; Rengarajan, Jyothi
2014-01-01
Mycobacterium tuberculosis (Mtb) employs multiple strategies to evade host immune responses and persist within macrophages. We have previously shown that the cell envelope-associated Mtb serine hydrolase, Hip1, prevents robust macrophage activation and dampens host pro-inflammatory responses, allowing Mtb to delay immune detection and accelerate disease progression. We now provide key mechanistic insights into the molecular and biochemical basis of Hip1 function. We establish that Hip1 is a serine protease with activity against protein and peptide substrates. Further, we show that the Mtb GroEL2 protein is a direct substrate of Hip1 protease activity. Cleavage of GroEL2 is specifically inhibited by serine protease inhibitors. We mapped the cleavage site within the N-terminus of GroEL2 and confirmed that this site is required for proteolysis of GroEL2 during Mtb growth. Interestingly, we discovered that Hip1-mediated cleavage of GroEL2 converts the protein from a multimeric to a monomeric form. Moreover, ectopic expression of cleaved GroEL2 monomers into the hip1 mutant complemented the hyperinflammatory phenotype of the hip1 mutant and restored wild type levels of cytokine responses in infected macrophages. Our studies point to Hip1-dependent proteolysis as a novel regulatory mechanism that helps Mtb respond rapidly to changing host immune environments during infection. These findings position Hip1 as an attractive target for inhibition for developing immunomodulatory therapeutics against Mtb. PMID:24830429
Trdá, Lucie; Fernandez, Olivier; Boutrot, Freddy; Héloir, Marie-Claire; Kelloniemi, Jani; Daire, Xavier; Adrian, Marielle; Clément, Christophe; Zipfel, Cyril; Dorey, Stéphan; Poinssot, Benoit
2014-03-01
• The role of flagellin perception in the context of plant beneficial bacteria still remains unclear. Here, we characterized the flagellin sensing system flg22-FLAGELLIN SENSING 2 (FLS2) in grapevine, and analyzed the flagellin perception in the interaction with the endophytic plant growth-promoting rhizobacterium (PGPR) Burkholderia phytofirmans. • The functionality of the grapevine FLS2 receptor, VvFLS2, was demonstrated by complementation assays in the Arabidopsis thaliana fls2 mutant, which restored flg22-induced H₂O₂ production and growth inhibition. Using synthetic flg22 peptides from different bacterial origins, we compared recognition specificities between VvFLS2 and AtFLS2. • In grapevine, flg22-triggered immune responses are conserved and led to partial resistance against Botrytis cinerea. Unlike flg22 peptides derived from Pseudomonas aeruginosa or Xanthomonas campestris, flg22 peptide derived from B. phytofirmans triggered only a small oxidative burst, weak and transient defense gene induction and no growth inhibition in grapevine. Although, in Arabidopsis, all the flg22 epitopes exhibited similar biological activities, the expression of VvFLS2 into the fls2 background conferred differential flg22 responses characteristic for grapevine. • These results demonstrate that VvFLS2 differentially recognizes flg22 from different bacteria, and suggest that flagellin from the beneficial PGPR B. phytofirmans has evolved to evade this grapevine immune recognition system. No claim to original European Union works. New Phytologist © 2013 New Phytologist Trust.
7 CFR 61.36 - Cause for suspension or revocation.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) has violated or evaded any provision of the Act, these regulations, or the sampling methods prescribed... (CONTINUED) COTTONSEED SOLD OR OFFERED FOR SALE FOR CRUSHING PURPOSES (INSPECTION, SAMPLING AND CERTIFICATION...
29 CFR 778.105 - Determining the workweek.
Code of Federal Regulations, 2010 CFR
2010-07-01
... or different workweeks may be established for different employees or groups of employees. Once the... permanent and is not designed to evade the overtime requirements of the Act. The proper method of computing...
ERIC Educational Resources Information Center
Ward, Jeremy
2001-01-01
Examines chemical engineering students' attitudes to text and other parts of English language textbooks. A questionnaire was administered to a group of undergraduates. Results reveal one way students get around the problem of textbook reading. (Author/VWL)
7 CFR 1.6 - Aggregating requests.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., is attempting to break a request down into a series of requests for the purpose of evading the... be considered in determining whether such a belief would be reasonable is the brevity of the time...
Path Planning Algorithms for Autonomous Border Patrol Vehicles
NASA Astrophysics Data System (ADS)
Lau, George Tin Lam
This thesis presents an online path planning algorithm developed for unmanned vehicles in charge of autonomous border patrol. In this Pursuit-Evasion game, the unmanned vehicle is required to capture multiple trespassers on its own before any of them reach a target safe house where they are safe from capture. The problem formulation is based on Isaacs' Target Guarding problem, but extended to the case of multiple evaders. The proposed path planning method is based on Rapidly-exploring random trees (RRT) and is capable of producing trajectories within several seconds to capture 2 or 3 evaders. Simulations are carried out to demonstrate that the resulting trajectories approach the optimal solution produced by a nonlinear programming-based numerical optimal control solver. Experiments are also conducted on unmanned ground vehicles to show the feasibility of implementing the proposed online path planning algorithm on physical applications.
Cloak and Dagger: Alternative Immune Evasion and Modulation Strategies of Poxviruses
Bidgood, Susanna R.; Mercer, Jason
2015-01-01
As all viruses rely on cellular factors throughout their replication cycle, to be successful they must evolve strategies to evade and/or manipulate the defence mechanisms employed by the host cell. In addition to their expression of a wide array of host modulatory factors, several recent studies have suggested that poxviruses may have evolved unique mechanisms to shunt or evade host detection. These potential mechanisms include mimicry of apoptotic bodies by mature virions (MVs), the use of viral sub-structures termed lateral bodies for the packaging and delivery of host modulators, and the formation of a second, “cloaked” form of infectious extracellular virus (EVs). Here we discuss these various strategies and how they may facilitate poxvirus immune evasion. Finally we propose a model for the exploitation of the cellular exosome pathway for the formation of EVs. PMID:26308043
Animal models of myasthenia gravis: utility and limitations
Mantegazza, Renato; Cordiglieri, Chiara; Consonni, Alessandra; Baggi, Fulvio
2016-01-01
Myasthenia gravis (MG) is a chronic autoimmune disease caused by the immune attack of the neuromuscular junction. Antibodies directed against the acetylcholine receptor (AChR) induce receptor degradation, complement cascade activation, and postsynaptic membrane destruction, resulting in functional reduction in AChR availability. Besides anti-AChR antibodies, other autoantibodies are known to play pathogenic roles in MG. The experimental autoimmune MG (EAMG) models have been of great help over the years in understanding the pathophysiological role of specific autoantibodies and T helper lymphocytes and in suggesting new therapies for prevention and modulation of the ongoing disease. EAMG can be induced in mice and rats of susceptible strains that show clinical symptoms mimicking the human disease. EAMG models are helpful for studying both the muscle and the immune compartments to evaluate new treatment perspectives. In this review, we concentrate on recent findings on EAMG models, focusing on their utility and limitations. PMID:27019601
A signal processing framework for simultaneous detection of multiple environmental contaminants
NASA Astrophysics Data System (ADS)
Chakraborty, Subhadeep; Manahan, Michael P.; Mench, Matthew M.
2013-11-01
The possibility of large-scale attacks using chemical warfare agents (CWAs) has exposed the critical need for fundamental research enabling the reliable, unambiguous and early detection of trace CWAs and toxic industrial chemicals. This paper presents a unique approach for the identification and classification of simultaneously present multiple environmental contaminants by perturbing an electrochemical (EC) sensor with an oscillating potential for the extraction of statistically rich information from the current response. The dynamic response, being a function of the degree and mechanism of contamination, is then processed with a symbolic dynamic filter for the extraction of representative patterns, which are then classified using a trained neural network. The approach presented in this paper promises to extend the sensing power and sensitivity of these EC sensors by augmenting and complementing sensor technology with state-of-the-art embedded real-time signal processing capabilities.
Combined treatment of mezcal vinasses by ozonation and activated sludge.
2017-10-18
In Mexico, mezcal production generates huge amounts of vinasses (MV) that cause negative environmental impacts. Thus, MV treatment is necessary before discharge to water bodies. Although there is no information for mezcal vinasses, similar effluents have been treated by biological processes (i.e. anaerobic and aerobic) usually complemented by oxidative chemical pretreatments (ozonation) and physico-chemical methods. In this work MV were first ozonated and followed by batch aerobic biological degradation. In the ozonation stage, organic matter removals were 4.5-11 % as COD, whereas the removal of aromatic compounds and phenols were 16-32 % and 48-83 % respectively. In the aerobic post-treatment, COD depletions up to 85 % were achieved; removals in ozone pre-treated vinasses were higher (80 to 85 %) than that of raw vinasse (69 %). It seems that ozonation preferentially attacked the recalcitrant fraction of organic matter present in the vinasses and increased its aerobic biodegradability.
Meyer, N; McMenamin, J; Robertson, C; Donaghy, M; Allardice, G; Cooper, D
2008-07-01
In 18 weeks, Health Protection Scotland (HPS) deployed a syndromic surveillance system to early-detect natural or intentional disease outbreaks during the G8 Summit 2005 at Gleneagles, Scotland. The system integrated clinical and non-clinical datasets. Clinical datasets included Accident & Emergency (A&E) syndromes, and General Practice (GPs) codes grouped into syndromes. Non-clinical data included telephone calls to a nurse helpline, laboratory test orders, and hotel staff absenteeism. A cumulative sum-based detection algorithm and a log-linear regression model identified signals in the data. The system had a fax-based track for real-time identification of unusual presentations. Ninety-five signals were triggered by the detection algorithms and four forms were faxed to HPS. Thirteen signals were investigated. The system successfully complemented a traditional surveillance system in identifying a small cluster of gastroenteritis among the police force and triggered interventions to prevent further cases.
NASA Technical Reports Server (NTRS)
Cole, G. L.; Dustin, M. O.; Neiner, G. H.
1975-01-01
Results of a wind tunnel investigation are presented. The inlet was modified so that airflow can be removed through a porous cowl-bleed region in the vicinity of the throat. Bleed plenum exit flow area is controlled by relief type mechanical valves. Unlike valves in previous systems, these are made for use in a high Mach flight environment and include refinements so that the system could be tested on a NASA YF-12 aircraft. The valves were designed to provide their own reference pressure. The results show that the system can absorb internal-airflow-transients that are too fast for a conventional bypass door control system and that the two systems complement each other quite well. Increased tolerance to angle of attack and Mach number changes is indicated. The valves should provide sufficient time for the inlet control system to make geometry changes required to keep the inlet started.
About signs and symptoms: can semiotics expand the view of clinical medicine?
Nessa, J
1996-12-01
Semiotics, the theory of sign and meaning, may help physicians complement the project of interpreting signs and symptoms into diagnoses. A sign stands for something. We communicate indirectly through signs, and make sense of our world by interpreting signs into meaning. Thus, through association and inference, we transform flowers into love, Othello into jealousy, and chest pain into heart attack. Medical semiotics is part of general semiotics, which means the study of life of signs within society. With special reference to a case story, elements from general semiotics, together with two theoreticians of equal importance, the Swiss linguist Ferdinand de Saussure and the American logician Charles Sanders Peirce, are presented. Two different modes of understanding clinical medicine are contrasted to illustrate the external link between what we believe or suggest, on the one hand, and the external reality on the other hand.
Judgment Evading Foreign States Accountability Act of 2011
Sen. Wicker, Roger F. [R-MS
2011-05-09
Senate - 05/09/2011 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Nonaka, Mayumi I; Zsigmond, Eva; Kudo, Akihiko; Kawakami, Hayato; Yoshida, Kaoru; Yoshida, Manabu; Kawano, Natsuko; Miyado, Kenji; Nonaka, Masaru; Wetsel, Rick A
2015-04-01
C4b-binding protein (C4BP) is known as one of the circulating complement regulators that prevents excessive activation of the host-defense complement system. We have reported previously that C4BP is expressed abundantly in the rodent epididymis, one of the male reproductive organs connecting the testis and vas deferens, where immature spermatozoa acquire their motility and fertilizing ability during their transit through the duct. Epididymal C4BP (EpC4BP) is synthesized androgen-dependently by the epithelial cells, secreted into the lumen, and bound to the outer membrane of the passing spermatozoa. In this study, we found that EpC4BP is secreted as a large oligomer, similar to the serum C4BP, but is digested during the epididymal transit and is almost lost from both the luminal fluid and the sperm surface in the vas deferens. Such a processing pattern is not known in serum C4BP, suggesting that EpC4BP and serum C4BP might have different functional mechanisms, and that there is a novel function of EpC4BP in reproduction. In addition, the disappearance of EpC4BP from the sperm surface prior to ejaculation suggests that EpC4BP works only in the epididymis and would not work in the female reproductive tract to protect spermatozoa from complement attack. Next, we generated C4BP-deficient (C4BP-/-) mice to examine the possible role of EpC4BP in reproduction. However, the C4BP-/- mice were fertile and no significant differences were observed between the C4BP-/- and wild-type mouse spermatozoa in terms of morphology, motility, and rate of the spontaneous acrosome reaction. These results suggest that EpC4BP is involved in male reproduction, but not essential for sperm maturation. Copyright © 2014 Elsevier GmbH. All rights reserved.
49 CFR 26.73 - What are other rules affecting certification?
Code of Federal Regulations, 2011 CFR
2011-10-01
... decisions, whether a firm has exhibited a pattern of conduct indicating its involvement in attempts to evade... cannot be certified. (f) Recognition of a business as a separate entity for tax or corporate purposes is...
49 CFR 26.73 - What are other rules affecting certification?
Code of Federal Regulations, 2010 CFR
2010-10-01
... decisions, whether a firm has exhibited a pattern of conduct indicating its involvement in attempts to evade... cannot be certified. (f) Recognition of a business as a separate entity for tax or corporate purposes is...
Judgment Evading Foreign States Accountability Act of 2011
Rep. Mack, Connie [R-FL-14
2011-05-06
House - 11/29/2012 Forwarded by Subcommittee to Full Committee in the Nature of a Substitute (Amended) by Voice Vote . (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Pursuit and Evasion Strategies in Football.
ERIC Educational Resources Information Center
O'Connell, James
1995-01-01
Explores strategies in the situation of a runner trying to evade a tackler on a football field. Enables the student to test intuitive strategies in a familiar situation using simple graphical and numerical methods or direct experimentation. (JRH)
"Atypical" Employment and the Failure of Labour Law.
ERIC Educational Resources Information Center
Stewart, Andrew
1992-01-01
Increased casual employment and contract labor challenge the protective nature of Australian labor law. Laws and social policies should not cause casual and self-employed workers to be denied benefits nor allow employers to evade standards. (SK)
Two-mode back-action-evading measurements in cavity optomechanics
NASA Astrophysics Data System (ADS)
Woolley, M. J.; Clerk, A. A.
2013-06-01
We study theoretically a three-mode optomechanical system where two mechanical oscillators are coupled to a single cavity mode. By using two-tone (i.e., amplitude-modulated) driving of the cavity, it is possible to couple the cavity to a single collective quadrature of the mechanical oscillators. In such a way, a back-action-evading measurement of the collective mechanical quadrature is possible. We discuss how this can allow one to measure both quadratures of a mechanical force beyond the full quantum limit, paying close attention to the role of dissipation and experimental imperfections. We also describe how this scheme allows one to generate steady-state mechanical entanglement; namely, one can conditionally prepare an entangled, two-mode squeezed mechanical state. This entanglement can be verified directly from the measurement record by applying a generalized version of Duan's inequality; we also discuss how feedback can be used to produce unconditional entanglement.
Neutrophil evasion strategies by Streptococcus pneumoniae and Staphylococcus aureus.
Lewis, Megan L; Surewaard, Bas G J
2018-03-01
Humans are well equipped to defend themselves against bacteria. The innate immune system employs diverse mechanisms to recognize, control and initiate a response that can destroy millions of different microbes. Microbes that evade the sophisticated innate immune system are able to escape detection and could become pathogens. The pathogens Streptococcus pneumoniae and Staphylococcus aureus are particularly successful due to the development of a wide variety of virulence strategies for bacterial pathogenesis and they invest significant efforts towards mechanisms that allow for neutrophil evasion. Neutrophils are a primary cellular defense and can rapidly kill invading microbes, which is an indispensable function for maintaining host health. This review compares the key features of Streptococcus pneumoniae and Staphylococcus aureus in epidemiology, with a specific focus on virulence mechanisms utilized to evade neutrophils in bacterial pathogenesis. It is important to understand the complex interactions between pathogenic bacteria and neutrophils so that we can disrupt the ability of pathogens to cause disease.
Kuss-Duerkop, Sharon K.; Westrich, Joseph A.
2018-01-01
Viruses have evolved various mechanisms to evade host immunity and ensure efficient viral replication and persistence. Several DNA tumor viruses modulate host DNA methyltransferases for epigenetic dysregulation of immune-related gene expression in host cells. The host immune responses suppressed by virus-induced aberrant DNA methylation are also frequently involved in antitumor immune responses. Here, we describe viral mechanisms and virus–host interactions by which DNA tumor viruses regulate host DNA methylation to evade antiviral immunity, which may contribute to the generation of an immunosuppressive microenvironment during cancer development. Recent trials of immunotherapies have shown promising results to treat multiple cancers; however, a significant number of non-responders necessitate identifying additional targets for cancer immunotherapies. Thus, understanding immune evasion mechanisms of cancer-causing viruses may provide great insights for reversing immune suppression to prevent and treat associated cancers. PMID:29438328
Fungal Strategies to Evade the Host Immune Recognition.
Hernández-Chávez, Marco J; Pérez-García, Luis A; Niño-Vega, Gustavo A; Mora-Montes, Héctor M
2017-09-23
The recognition of fungal cells by the host immune system is key during the establishment of a protective anti-fungal response. Even though the immune system has evolved a vast number of processes to control these organisms, they have developed strategies to fight back, avoiding the proper recognition by immune components and thus interfering with the host protective mechanisms. Therefore, the strategies to evade the immune system are as important as the virulence factors and attributes that damage the host tissues and cells. Here, we performed a thorough revision of the main fungal tactics to escape from the host immunosurveillance processes. These include the composition and organization of the cell wall, the fungal capsule, the formation of titan cells, biofilms, and asteroid bodies; the ability to undergo dimorphism; and the escape from nutritional immunity, extracellular traps, phagocytosis, and the action of humoral immune effectors.
Xu, Weifeng; Santini, Paul A.; Sullivan, John S.; He, Bing; Shan, Meimei; Ball, Susan C.; Dyer, Wayne B.; Ketas, Thomas J.; Chadburn, Amy; Cohen-Gould, Leona; Knowles, Daniel M.; Chiu, April; Sanders, Rogier W.; Chen, Kang; Cerutti, Andrea
2009-01-01
Contact-dependent communication between immune cells generates protection, but also facilitates viral spread. We found that macrophages formed long-range actin-propelled conduits in response to negative factor (Nef), a human immunodeficiency virus type-1 (HIV-1) protein with immunosuppressive functions. Conduits attenuated immunoglobulin G2 (IgG2) and IgA class switching in systemic and intestinal lymphoid follicles by shuttling Nef from infected macrophages to B cells through a guanine exchange factor-dependent pathway involving the amino-terminal anchor, central core and carboxy-terminal flexible loop of Nef. By showing stronger virus-specific IgG2 and IgA responses in patients harboring Nef-deficient virions, our data suggest that HIV-1 exploits intercellular highways as a “Trojan horse” to deliver Nef to B cells and evade humoral immunity systemically and at mucosal sites of entry. PMID:19648924
Abderhalden, Christoph; Needham, Ian; Dassen, Theo; Halfens, Ruud; Haug, Hans-Joachim; Fischer, Joachim
2006-04-25
Patient aggression is a common problem in acute psychiatric wards and calls for preventive measures. The timely use of preventive measures presupposes a preceded risk assessment. The Norwegian Brøset-Violence-Checklist (BVC) is one of the few instruments suited for short-time prediction of violence of psychiatric inpatients in routine care. Aims of our study were to improve the accuracy of the short-term prediction of violence in acute inpatient settings by combining the Brøset-Violence-Checklist (BVC) with an overall subjective clinical risk-assessment and to test the application of the combined measure in daily practice. We conducted a prospective cohort study with two samples of newly admitted psychiatric patients for instrument development (219 patients) and clinical application (300 patients). Risk of physical attacks was assessed by combining the 6-item BVC and a 6-point score derived from a Visual Analog Scale. Incidents were registered with the Staff Observation of Aggression Scale-Revised SOAS-R. Test accuracy was described as the area under the receiver operating characteristic curve (AUCROC). The AUCROC of the new VAS-complemented BVC-version (BVC-VAS) was 0.95 in and 0.89 in the derivation and validation study respectively. The BVC-VAS is an easy to use and accurate instrument for systematic short-term prediction of violent attacks in acute psychiatric wards. The inclusion of the VAS-derived data did not change the accuracy of the original BVC.
Killing machines: three pore-forming proteins of the immune system
McCormack, Ryan; de Armas, Lesley; Shiratsuchi, Motoaki
2014-01-01
The evolution of early multicellular eukaryotes 400–500 million years ago required a defensive strategy against microbial invasion. Pore-forming proteins containing the membrane-attack-complex-perforin (MACPF) domain were selected as the most efficient means to destroy bacteria or virally infected cells. The mechanism of pore formation by the MACPF domain is distinctive in that pore formation is purely physical and unspecific. The MACPF domain polymerizes, refolds, and inserts itself into bilayer membranes or bacterial outer cell walls. The displacement of surface lipid/carbohydrate molecules by the polymerizing MACPF domain creates clusters of large, water-filled holes that destabilize the barrier function and provide access for additional anti-bacterial or anti-viral effectors to sensitive sites that complete the destruction of the invader via enzymatic or chemical attack. The highly efficient mechanism of anti-microbial defense by a combined physical and chemical strategy using pore-forming MACPF-proteins has been retargeted during evolution of vertebrates and mammals for three purposes: (1) to kill extracellular bacteria C9/polyC9 evolved in conjunction with complement, (2) to kill virus infected and cancer cells perforin-1/polyperforin-1 CTL evolved targeted by NK and CTL, and (3) to kill intracellular bacteria transmembrane perforin-2/putative polyperforin-2 evolved targeted by phagocytic and nonphagocytic cells. Our laboratory has been involved in the discovery and description of each of the three pore-formers that will be reviewed here. PMID:24293008
DOE Office of Scientific and Technical Information (OSTI.GOV)
Slade, Daniel J.; Lovelace, Leslie L.; Chruszcz, Maksymilian
2010-03-04
Human C8 is one of five complement components (C5b, C6, C7, C8, and C9) that assemble on bacterial membranes to form a porelike structure referred to as the 'membrane attack complex' (MAC). C8 contains three genetically distinct subunits (C8{alpha}, C8{beta}, C8{gamma}) arranged as a disulfide-linked C8{alpha}-{gamma} dimer that is noncovalently associated with C8{beta}. C6, C7 C8{alpha}, C8{beta}, and C9 are homologous. All contain N- and C-terminal modules and an intervening 40-kDa segment referred to as the membrane attack complex/perforin (MACPF) domain. The C8{gamma} subunit is unrelated and belongs to the lipocalin family of proteins that display a {beta}-barrel fold andmore » generally bind small, hydrophobic ligands. Several hundred proteins with MACPF domains have been identified based on sequence similarity; however, the structure and function of most are unknown. Crystal structures of the secreted bacterial protein Plu-MACPF and the human C8{alpha} MACPF domain were recently reported and both display a fold similar to those of the bacterial pore-forming cholesterol-dependent cytolysins (CDCs). In the present study, we determined the crystal structure of the human C8{alpha} MACPF domain disulfide-linked to C8{gamma} ({alpha}MACPF-{gamma}) at 2.15 {angstrom} resolution. The {alpha}MACPF portion has the predicted CDC-like fold and shows two regions of interaction with C8{gamma}. One is in a previously characterized 19-residue insertion (indel) in C8{alpha} and fills the entrance to the putative C8{gamma} ligand-binding site. The second is a hydrophobic pocket that makes contact with residues on the side of the C8{gamma} {beta}-barrel. The latter interaction induces conformational changes in {alpha}MACPF that are likely important for C8 function. Also observed is structural conservation of the MACPF signature motif Y/W-G-T/S-H-F/Y-X{sub 6}-G-G in {alpha}MACPF and Plu-MACPF, and conservation of several key glycine residues known to be important for refolding and pore formation by CDCs.« less
Zelek, Wioleta M; Watkins, Lewis M; Howell, Owain W; Evans, Rhian; Loveless, Sam; Robertson, Neil P; Beenes, Marijke; Willems, Loek; Brandwijk, Ricardo; Morgan, B Paul
2018-02-01
CD59, a broadly expressed glycosylphosphatidylinositol-anchored protein, is the principal cell inhibitor of complement membrane attack on cells. In the demyelinating disorders, multiple sclerosis (MS) and neuromyelitis optica spectrum disorder (NMOSD), elevated complement protein levels, including soluble CD59 (sCD59), were reported in cerebrospinal fluid (CSF). We compared sCD59 levels in CSF and matched plasma in controls and patients with MS, NMOSD and clinically isolated syndrome (CIS) and investigated the source of CSF sCD59 and whether it was microparticle associated. sCD59 was quantified using enzyme-linked immunosorbent assay (ELISA; Hycult; HK374-02). Patient and control CSF was subjected to western blotting to characterise anti-CD59-reactive materials. CD59 was localised by immunostaining and in situ hybridisation. CSF sCD59 levels were double those in plasma (CSF, 30.2 ng/mL; plasma, 16.3 ng/mL). Plasma but not CSF sCD59 levels differentiated MS from NMOSD, MS from CIS and NMOSD/CIS from controls. Elimination of microparticles confirmed that CSF sCD59 was not membrane anchored. CSF levels of sCD59 are not a biomarker of demyelinating diseases. High levels of sCD59 in CSF relative to plasma suggest an intrathecal source; CD59 expression in brain parenchyma was low, but expression was strong on choroid plexus (CP) epithelium, immediately adjacent the CSF, suggesting that this is the likely source.
Coers, Jörn; Bernstein-Hanley, Isaac; Grotsky, David; Parvanova, Iana; Howard, Jonathan C; Taylor, Gregory A; Dietrich, William F; Starnbach, Michael N
2008-05-01
Chlamydiae are obligate intracellular bacterial pathogens that exhibit a broad range of host tropism. Differences in host tropism between Chlamydia species have been linked to host variations in IFN-gamma-mediated immune responses. In mouse cells, IFN-gamma can effectively restrict growth of the human pathogen Chlamydia trachomatis but fails to control growth of the closely related mouse pathogen Chlamydia muridarum. The ability of mouse cells to resist C. trachomatis replication is largely dependent on the induction of a family of IFN-gamma-inducible GTPases called immunity-related GTPases or IRGs. In this study we demonstrate that C. muridarum can specifically evade IRG-mediated host resistance. It has previously been suggested that C. muridarum inactivates the IRG protein Irga6 (Iigp1) to dampen the murine immune response. However, we show that Irga6 is dispensable for the control of C. trachomatis replication. Instead, an effective IFN-gamma response to C. trachomatis requires the IRG proteins Irgm1 (Lrg47), Irgm3 (Igtp), and Irgb10. Ectopic expression of Irgb10 in the absence of IFN-gamma is sufficient to reduce intracellular growth of C. trachomatis but fails to restrict growth of C. muridarum, indicating that C. muridarum can specifically evade Irgb10-driven host responses. Importantly, we find that Irgb10 protein intimately associates with inclusions harboring C. trachomatis but is absent from inclusions formed by C. muridarum. These data suggest that C. muridarum has evolved a mechanism to escape the murine IFN-gamma response by restricting access of Irgb10 and possibly other IRG proteins to the inclusion.
Helmet-Cam: tool for assessing miners’ respirable dust exposure
Cecala, A.B.; Reed, W.R.; Joy, G.J.; Westmoreland, S.C.; O’Brien, A.D.
2015-01-01
Video technology coupled with datalogging exposure monitors have been used to evaluate worker exposure to different types of contaminants. However, previous application of this technology used a stationary video camera to record the worker’s activity while the worker wore some type of contaminant monitor. These techniques are not applicable to mobile workers in the mining industry because of their need to move around the operation while performing their duties. The Helmet-Cam is a recently developed exposure assessment tool that integrates a person-wearable video recorder with a datalogging dust monitor. These are worn by the miner in a backpack, safety belt or safety vest to identify areas or job tasks of elevated exposure. After a miner performs his or her job while wearing the unit, the video and dust exposure data files are downloaded to a computer and then merged together through a NIOSH-developed computer software program called Enhanced Video Analysis of Dust Exposure (EVADE). By providing synchronized playback of the merged video footage and dust exposure data, the EVADE software allows for the assessment and identification of key work areas and processes, as well as work tasks that significantly impact a worker’s personal respirable dust exposure. The Helmet-Cam technology has been tested at a number of metal/nonmetal mining operations and has proven to be a valuable assessment tool. Mining companies wishing to use this technique can purchase a commercially available video camera and an instantaneous dust monitor to obtain the necessary data, and the NIOSH-developed EVADE software will be available for download at no cost on the NIOSH website. PMID:26380529
Jenkins, Stuart I; Weinberg, Daniel; Al-Shakli, Arwa F; Fernandes, Alinda R; Yiu, Humphrey H P; Telling, Neil D; Roach, Paul; Chari, Divya M
2016-02-28
Surface engineering to control cell behavior is of high interest across the chemical engineering, drug delivery and biomaterial communities. Defined chemical strategies are necessary to tailor nanoscale protein interactions/adsorption, enabling control of cell behaviors for development of novel therapeutic strategies. Nanoparticle-based therapies benefit from such strategies but particle targeting to sites of neurological injury remains challenging due to circulatory immune clearance. As a strategy to overcome this barrier, the use of stealth coatings can reduce immune clearance and prolong circulatory times, thereby enhancing therapeutic capacity. Polyethylene glycol (PEG) is the most widely-used stealth coating and facilitates particle accumulation in the brain. However, once within the brain, the mode of handling of PEGylated particles by the resident immune cells of the brain itself (the 'microglia') is unknown. This is a critical question as it is well established that microglia avidly sequester nanoparticles, limiting their bioavailability and posing a major translational barrier. If PEGylation can be proved to promote evasion of microglia, then this information will be of high value in developing tailored nanoparticle-based therapies for neurological applications. Here, we have conducted the first comparative study of uptake of PEGylated particles by all the major (immune and non-immune) brain cell types. We prove for the first time that PEGylated nanoparticles evade major brain cell populations - a phenomenon which will enhance extracellular bioavailability. We demonstrate changes in protein coronas around these particles within biological media, and discuss how surface chemistry presentation may affect this process and subsequent cellular interactions. Copyright © 2016 Elsevier B.V. All rights reserved.
Mathew, Stephen O; Chaudhary, Pankaj; Powers, Sheila B; Vishwanatha, Jamboor K; Mathew, Porunelloor A
2016-10-18
Prostate cancer is the most common type of cancer diagnosed and the second leading cause of cancer-related death in American men. Natural Killer (NK) cells are the first line of defense against cancer and infections. NK cell function is regulated by a delicate balance between signals received through activating and inhibitory receptors. Previously, we identified Lectin-like transcript-1 (LLT1/OCIL/CLEC2D) as a counter-receptor for the NK cell inhibitory receptor NKRP1A (CD161). Interaction of LLT1 expressed on target cells with NKRP1A inhibits NK cell activation. In this study, we have found that LLT1 was overexpressed on prostate cancer cell lines (DU145, LNCaP, 22Rv1 and PC3) and in primary prostate cancer tissues both at the mRNA and protein level. We further showed that LLT1 is retained intracellularly in normal prostate cells with minimal cell surface expression. Blocking LLT1 interaction with NKRP1A by anti-LLT1 mAb on prostate cancer cells increased the NK-mediated cytotoxicity of prostate cancer cells. The results indicate that prostate cancer cells may evade immune attack by NK cells by expressing LLT1 to inhibit NK cell-mediated cytolytic activity through LLT1-NKRP1A interaction. Blocking LLT1-NKRP1A interaction will make prostate cancer cells susceptible to killing by NK cells and therefore may be a new therapeutic option for treatment of prostate cancer.
Immune cell landscape in therapy-naïve squamous cell and adenocarcinomas of the lung.
Brcic, Luka; Stanzer, Stefanie; Krenbek, Dagmar; Gruber-Moesenbacher, Ulrike; Absenger, Gudrun; Quehenberger, Franz; Valipour, Arschang; Lindenmann, Joerg; Stoeger, Herbert; Al Effah, Mohamed; Fediuk, Melanie; Balic, Marija; Popper, Helmut H
2018-04-01
Squamous cell and adenocarcinomas of the lung develop different mechanisms during carcinogenesis to evade attacks of the immune system. Besides the well-known check-point control programmed death 1 and its ligand, many more mechanisms, acting either tumoricidal or in favor of tumor progression, exist. Analysis of the immune cell profiles in resected tissues and bronchoalveolar lavage samples and correlation between them and with overall survival data was performed. In all tumor samples in this study, cells of the immune system expressed a tumor-cooperating phenotype. High numbers of regulatory T cells, or alternatively expression of Vista on lymphocytes was present. Tumoricidal dendritic cells were absent in tumor tissue, and barely present in bronchoalveolar lavage, whereas tumor-friendly monocytoid and plasmocytoid dendritic cells were seen in both. Alveolar macrophages were predominantly differentiated into tumor-cooperating M2 types, whereas tumoricidal M1 macrophages were absent or rare. The expression of PDL1 on tumor cells did not correlate with any other immune cells. Expression of PD1 on lymphocytes was frequently encountered. None of analyzed immune cells showed correlation with overall survival. Immune cells in bronchoalveolar lavage and tissue did not correlate. For the first time, a tissue-based analysis of different immune cells in squamous cell and adenocarcinomas of the lung is provided, trying to explain their potential role in tumor development and progression. Discordant numbers of cells with bronchoalveolar lavage are most probably due to the fact that bronchoalveolar lavage reflects the situation in the whole lung, where chronic obstructive lung disease and other conditions are present.
Hölzemer, Angelique; Thobakgale, Christina F; Jimenez Cruz, Camilo A; Garcia-Beltran, Wilfredo F; Carlson, Jonathan M; van Teijlingen, Nienke H; Mann, Jaclyn K; Jaggernath, Manjeetha; Kang, Seung-gu; Körner, Christian; Chung, Amy W; Schafer, Jamie L; Evans, David T; Alter, Galit; Walker, Bruce D; Goulder, Philip J; Carrington, Mary; Hartmann, Pia; Pertel, Thomas; Zhou, Ruhong; Ndung'u, Thumbi; Altfeld, Marcus
2015-11-01
Viruses can evade immune surveillance, but the underlying mechanisms are insufficiently understood. Here, we sought to understand the mechanisms by which natural killer (NK) cells recognize HIV-1-infected cells and how this virus can evade NK-cell-mediated immune pressure. Two sequence mutations in p24 Gag associated with the presence of specific KIR/HLA combined genotypes were identified in HIV-1 clade C viruses from a large cohort of infected, untreated individuals in South Africa (n = 392), suggesting viral escape from KIR+ NK cells through sequence variations within HLA class I-presented epitopes. One sequence polymorphism at position 303 of p24 Gag (TGag303V), selected for in infected individuals with both KIR2DL3 and HLA-C*03:04, enabled significantly better binding of the inhibitory KIR2DL3 receptor to HLA-C*03:04-expressing cells presenting this variant epitope compared to the wild-type epitope (wild-type mean 18.01 ± 10.45 standard deviation [SD] and variant mean 44.67 ± 14.42 SD, p = 0.002). Furthermore, activation of primary KIR2DL3+ NK cells from healthy donors in response to HLA-C*03:04+ target cells presenting the variant epitope was significantly reduced in comparison to cells presenting the wild-type sequence (wild-type mean 0.78 ± 0.07 standard error of the mean [SEM] and variant mean 0.63 ± 0.07 SEM, p = 0.012). Structural modeling and surface plasmon resonance of KIR/peptide/HLA interactions in the context of the different viral sequence variants studied supported these results. Future studies will be needed to assess processing and antigen presentation of the investigated HIV-1 epitope in natural infection, and the consequences for viral control. These data provide novel insights into how viruses can evade NK cell immunity through the selection of mutations in HLA-presented epitopes that enhance binding to inhibitory NK cell receptors. Better understanding of the mechanisms by which HIV-1 evades NK-cell-mediated immune pressure and the functional validation of a structural modeling approach will facilitate the development of novel targeted immune interventions to harness the antiviral activities of NK cells.
Histidine Kinase-Mediated Production and Autoassembly of Porphyromonas gingivalis Fimbriae▿ †
Nishikawa, Kiyoshi; Duncan, Margaret J.
2010-01-01
Porphyromonas gingivalis, a Gram-negative oral anaerobe, is strongly associated with chronic adult periodontitis, and it utilizes FimA fimbriae to persistently colonize and evade host defenses in the periodontal crevice. The FimA-related gene cluster (the fim gene cluster) is positively regulated by the FimS-FimR two-component system. In this study, comparative analyses between fimbriate type strain ATCC 33277 and fimbria-deficient strain W83 revealed differences in their fimS loci, which encode FimS histidine kinase. Using a reciprocal gene exchange system, we established that FimS from W83 is malfunctional. Complementation analysis with chimeric fimS constructs revealed that W83 FimS has a defective kinase domain due to a truncated conserved G3 box motif that provides an ATP-binding pocket. The introduction of the functional fimS from 33277 restored the production, but not polymerization, of endogenous FimA subunits in W83. Further analyses with a fimA-exchanged W83 isogenic strain showed that even the fimbria-deficient W83 retains the ability to polymerize FimA from 33277, indicating the assembly of mature FimA by a primary structure-dependent mechanism. It also was shown that the substantial expression of 33277-type FimA fimbriae in the W83 derivative requires the introduction and expression of the functional 33277 fimS. These findings indicate that FimSR is the unique and universal regulatory system that activates the fim gene cluster in a fimA genotype-independent manner. PMID:20118268
GHX, Broadlane form latest e-commerce linkup.
2002-08-01
Broadlane agreed in June to connect its electronic commerce system to the supplier-owned site run by GHX. As a result, contract compliance could either improve or be more easily evaded, depending on hospitals' response to the wider choice of suppliers.
Bidding: Getting the Best Price for School Foodservice.
ERIC Educational Resources Information Center
DiBella, Cecilia M.
1998-01-01
Sharon (Massachusetts) Public Schools developed an alternative procurement process for school food services that complies with state public bidding laws while evading "low-bid" constraints. The new process features evaluative criteria covering nutrition education, community outreach, management expertise, site visits, and price…
Effects of inspections in small world social networks with different contagion rules
NASA Astrophysics Data System (ADS)
Muñoz, Francisco; Nuño, Juan Carlos; Primicerio, Mario
2015-08-01
We study the way the structure of social links determines the effects of random inspections on a population formed by two types of individuals, e.g. tax-payers and tax-evaders (free riders). It is assumed that inspections occur in a larger scale than the population relaxation time and, therefore, a unique initial inspection is performed on a population that is completely formed by tax-evaders. Besides, the inspected tax-evaders become tax-payers forever. The social network is modeled as a Watts-Strogatz Small World whose topology can be tuned in terms of a parameter p ∈ [ 0 , 1 ] from regular (p = 0) to random (p = 1). Two local contagion rules are considered: (i) a continuous one that takes the proportion of neighbors to determine the next status of an individual (node) and (ii) a discontinuous (threshold rule) that assumes a minimum number of neighbors to modify the current state. In the former case, irrespective of the inspection intensity ν, the equilibrium population is always formed by tax-payers. In the mean field approach, we obtain the characteristic time of convergence as a function of ν and p. For the threshold contagion rule, we show that the response of the population to the intensity of inspections ν is a function of the structure of the social network p and the willingness of the individuals to change their state, r. It is shown that sharp transitions occur at critical values of ν that depends on p and r. We discuss these results within the context of tax evasion and fraud where the strategies of inspection could be of major relevance.
Hall, Wendy C E; Jolly, Donald T; Hrazdil, Jiri; Galbraith, John C; Greacen, Maria; Clanachan, Alexander S
2003-01-01
To evaluate the ability of the EmulSiv filter (EF) to remove extrinsic microbial contaminants from propofol. Aliquots of Staphylococcus aureus (S. aureus), Candida albicans (C. albicans), Klebsiella pneumoniae (K. pneumoniae), Moraxella osloensis (M. osloensis), Enterobacter agglomerans (E. agglomerans), Escherichia coli (E. coli), Serratia marcescens (S. marcescens), Moraxella catarrhalis (M. catarrhalis), Haemophilus influenzae (H. influenzae) and Campylobacter jejuni (C. jejuni) were inoculated into vials containing 20 mL of sterile propofol. The unfiltered inoculated propofol solutions served as controls. Ten millilitres and 20 mL samples of the inoculated propofol were filtered through the EF. All solutions were then subplated onto three culture plates using a precision 1 micro L calibrated platinum loop and incubated. The number of colony forming units (CFU) were counted. Data were analyzed using a one-sample t test, and a P value of less than 0.05 was selected as the level of statistical significance. The EF was able to completely remove CFU of S. aureus, C. albicans, K. pneumoniae, M. osloensis, E. agglomerans, E. coli, S. marcescens, and M. catarrhalis (P < 0.05). A small number of H. influenzae CFU were able to evade filtration in both the 10 mL and 20 mL samples. C. jejuni CFU were able to evade filtration in only the 10 mL sample. The EF removes the majority of microbial contaminates from propofol with the exception of H. influenzae and C. jejuni. Although the EF is capable of removing most of the microbial contamination produced by H. influenzae and C. jejuni, a few CFU are capable of evading filtration. Consequently, even the use of a filter capable of removing microbial contaminants is not a substitute for meticulous aseptic technique and prompt administration when propofol is used.
Attitudes and behaviour towards convenience food and food waste in the United Kingdom.
Mallinson, Lucy J; Russell, Jean M; Barker, Margo E
2016-08-01
Households in the UK discard much food. A reduction in such waste to mitigate environmental impact is part of UK government policy. This study investigated whether household food waste is linked to a lifestyle reliant on convenience food in younger consumers. A survey of 928 UK residents aged 18-40 years and responsible for the household food shopping (male n = 278; female n = 650) completed an online questionnaire designed to measure attitudes to convenience food and to quantify household food waste. Cluster analysis of 24 food-related lifestyle factors identified 5 consumer groups. General linear modelling techniques were used to test relationships between the purchase frequency of convenience food and household food waste. From the cluster analysis, five distinct convenience profiles emerged comprising: 'epicures' (n = 135), 'traditional consumers' (n = 255), 'casual consumers' (n = 246), 'food detached consumers' (n = 151) and 'kitchen evaders' (n = 141). Casual consumers and kitchen evaders were the most reliant on convenience food and notably were the most wasteful. The demographic profile of kitchen evaders matched the population groups currently targeted by UK food waste policy. Casual consumers represent a new and distinct group characterised by "buy a lot and waste a lot" behaviour. Household size, packaging format, price-awareness and marketing all appear to influence levels of food waste. However, it seems that subtle behavioural and sociocultural factors also have impact. Further research is needed to elucidate the factors that mediate the positive association between the purchase of convenience food and reported food waste in order to inform food waste policy and initiatives. Copyright © 2016 Elsevier Ltd. All rights reserved.
Deceptive Imprinting and Immune Refocusing in Vaccine Design
USDA-ARS?s Scientific Manuscript database
A large number of the world’s most widespread and problematic pathogens evade host immune responses by inducing strain specific immunity to immunodominant epitopes with high mutation rates capable of altering antigenic profiles. The immune system appears to be decoyed into reacting to these immunod...
The NIH Undiagnosed Diseases Program | NIH MedlinePlus the Magazine
... to discover and understand rare diseases,” says Eric D. Green, M.D., Ph.D., director of the National Human Genome Research Institute ( ... interdisciplinary approach,” says NIH Director Francis S. Collins, M.D., Ph.D. “The disorder had long-evaded conventional ...
Development and application of a gradient method for solving differential games
NASA Technical Reports Server (NTRS)
Roberts, D. A.; Montgomery, R. C.
1971-01-01
A technique for solving n-dimensional games is developed and applied to two pursuit-evasion games. The first is a two-dimensional game similar to the homicidal chauffeur but modified to resemble an airplane-helicopter engagement. The second is a five-dimensional game of two airplanes at constant altitude and with thrust and turning controls. The performance function to be optimized by the pursuer and evader was the distance between the evader and a given target point in front of the pursuer. The analytic solution to the first game reveals that both unique and nonunique solutions exist. A comparison between the gradient results and the analytic solution shows a dependence on the nominal controls in regions where nonunique solutions exist. In the unique solution region, the results from the two methods agree closely. The results for the five-dimensional two-airplane game are also shown to be dependent on the nominal controls selected and indicate that initial conditions are in a region of nonunique solutions.
Suppressive influences in the immune response to cancer.
Bronte, Vincenzo; Mocellin, Simone
2009-01-01
Although much evidence has been gathered demonstrating that immune effectors can play a significant role in controlling tumor growth under natural conditions or in response to therapeutic manipulation, it is clear that malignant cells do evade immune surveillance in most cases. Considering that anticancer active specific immunotherapy seems to have reached a plateau of results and that currently no vaccination regimen is indicated as a standard anticancer therapy, the dissection of the molecular events underlying tumor immune escape is the necessary condition to make anticancer vaccines a therapeutic weapon effective enough to be implemented in the routine clinical setting. Recent years have witnessed significant advances in our understanding of the molecular mechanisms underlying tumor immune escape. These mechanistic insights are fostering the development of rationally designed therapeutics aimed to revert the immunosuppressive circuits that undermine an effective antitumor immune response. In this review, the best characterized mechanisms that allow cancer cells to evade immune surveillance are overviewed and the most debated controversies constellating this complex field are highlighted.
Cytomegalovirus immune evasion of myeloid lineage cells.
Brinkmann, Melanie M; Dağ, Franziska; Hengel, Hartmut; Messerle, Martin; Kalinke, Ulrich; Čičin-Šain, Luka
2015-06-01
Cytomegalovirus (CMV) evades the immune system in many different ways, allowing the virus to grow and its progeny to spread in the face of an adverse environment. Mounting evidence about the antiviral role of myeloid immune cells has prompted the research of CMV immune evasion mechanisms targeting these cells. Several cells of the myeloid lineage, such as monocytes, dendritic cells and macrophages, play a role in viral control, but are also permissive for CMV and are naturally infected by it. Therefore, CMV evasion of myeloid cells involves mechanisms that qualitatively differ from the evasion of non-CMV-permissive immune cells of the lymphoid lineage. The evasion of myeloid cells includes effects in cis, where the virus modulates the immune signaling pathways within the infected myeloid cell, and those in trans, where the virus affects somatic cells targeted by cytokines released from myeloid cells. This review presents an overview of CMV strategies to modulate and evade the antiviral activity of myeloid cells in cis and in trans.
A Formidable Foe is Sabotaging Your Results: What You Should Know about Biofilms and Wound Healing
Barker, Jenny C; Khansa, Ibrahim; Gordillo, Gayle M
2017-01-01
Learning Objectives After reading this article, the participant should be able to: 1. Describe biofilm pathogenesis as it relates to problem wounds, 2. Understand the pre-clinical and clinical evidence implicating biofilm in problem wounds, 3. Explain the diagnostic and treatment challenges that biofilms create for problem wounds, 4. Demonstrate a basic understanding of emerging strategies aimed at counteracting these processes. Summary Biofilm represents a protected mode of growth for bacteria, allowing them to evade standard diagnostic techniques and avoid eradication by standard therapies. Though only recently discovered, biofilm has existed for millennia and complicates nearly every aspect of medicine. Biofilm impacts wound healing by allowing bacteria to evade immune responses, prolonging inflammation and disabling skin barrier function. It is important to understand why problem wounds persist despite state-of-the-art treatment, why they are difficult to accurately diagnose, and why they recur. The aim of this article is to focus on current gaps in knowledge related to problem wounds, specifically, biofilm infection. PMID:28445380
Application of differential game theory to role-determination in aerial combat
NASA Technical Reports Server (NTRS)
Merz, A. W.
1975-01-01
The development of criteria which specify the roles of pursuer and evader as functions of the relative geometry and of the important parameters of the problem are discussed. A reduced-order model of the relative motion is derived and discussed. In this model, the two aircraft move in the same plane at unequal but constant speeds, and with different maximum turn rates. The equations of relative motion are of third order, the dependent variables being the relative range, bearing, and heading of the two aircraft. Termination of the pursuit-evasion game is defined by either the heading-limited or the range-limited end condition. These are geometric conditions for which the evading aircraft is in front of the other, with the relative heading and relative range satisfying certain inequalities. Retrograde solutions to the equations of relative motion were used with the derived optimal terminal maneuvers to find where an assumed set of end conditions could have begun.
Abderhalden, Christoph; Needham, Ian; Dassen, Theo; Halfens, Ruud; Haug, Hans-Joachim; Fischer, Joachim
2006-01-01
Background Patient aggression is a common problem in acute psychiatric wards and calls for preventive measures. The timely use of preventive measures presupposes a preceded risk assessment. The Norwegian Brøset-Violence-Checklist (BVC) is one of the few instruments suited for short-time prediction of violence of psychiatric inpatients in routine care. Aims of our study were to improve the accuracy of the short-term prediction of violence in acute inpatient settings by combining the Brøset-Violence-Checklist (BVC) with an overall subjective clinical risk-assessment and to test the application of the combined measure in daily practice. Method We conducted a prospective cohort study with two samples of newly admitted psychiatric patients for instrument development (219 patients) and clinical application (300 patients). Risk of physical attacks was assessed by combining the 6-item BVC and a 6-point score derived from a Visual Analog Scale. Incidents were registered with the Staff Observation of Aggression Scale-Revised SOAS-R. Test accuracy was described as the area under the receiver operating characteristic curve (AUCROC). Results The AUCROC of the new VAS-complemented BVC-version (BVC-VAS) was 0.95 in and 0.89 in the derivation and validation study respectively. Conclusion The BVC-VAS is an easy to use and accurate instrument for systematic short-term prediction of violent attacks in acute psychiatric wards. The inclusion of the VAS-derived data did not change the accuracy of the original BVC. PMID:16638122
Role of short-acting nitroglycerin in the management of ischemic heart disease.
Boden, William E; Padala, Santosh K; Cabral, Katherine P; Buschmann, Ivo R; Sidhu, Mandeep S
2015-01-01
Nitroglycerin is the oldest and most commonly prescribed short-acting anti-anginal agent; however, despite its long history of therapeutic usage, patient and health care provider education regarding the clinical benefits of the short-acting formulations in patients with angina remains under-appreciated. Nitrates predominantly induce vasodilation in large capacitance blood vessels, increase epicardial coronary arterial diameter and coronary collateral blood flow, and impair platelet aggregation. The potential for the prophylactic effect of short-acting nitrates remains an under-appreciated part of optimal medical therapy to reduce angina and decrease myocardial ischemia, thereby enhancing the quality of life. Short-acting nitroglycerin, administered either as a sublingual tablet or spray, can complement anti-anginal therapy as part of optimal medical therapy in patients with refractory and recurrent angina either with or without myocardial revascularization, and is most commonly used to provide rapid therapeutic relief of acute recurrent angina attacks. When administered prophylactically, both formulations increase angina-free walking time on treadmill testing, abolish or delay ST segment depression, and increase exercise tolerance. The sublingual spray formulation provides several clinical advantages compared to tablet formulations, including a lower incidence of headache and superiority to the sublingual tablet in terms of therapeutic action and time to onset, while the magnitude and duration of vasodilatory action appears to be comparable. Furthermore, the sublingual spray formulation may be advantageous to tablet preparations in patients with dry mouth. This review discusses the efficacy and utility of short-acting nitroglycerin (sublingual spray and tablet) therapy for both preventing and aborting an acute angina attack, thereby leading to an improved quality of life.
Role of short-acting nitroglycerin in the management of ischemic heart disease
Boden, William E; Padala, Santosh K; Cabral, Katherine P; Buschmann, Ivo R; Sidhu, Mandeep S
2015-01-01
Nitroglycerin is the oldest and most commonly prescribed short-acting anti-anginal agent; however, despite its long history of therapeutic usage, patient and health care provider education regarding the clinical benefits of the short-acting formulations in patients with angina remains under-appreciated. Nitrates predominantly induce vasodilation in large capacitance blood vessels, increase epicardial coronary arterial diameter and coronary collateral blood flow, and impair platelet aggregation. The potential for the prophylactic effect of short-acting nitrates remains an under-appreciated part of optimal medical therapy to reduce angina and decrease myocardial ischemia, thereby enhancing the quality of life. Short-acting nitroglycerin, administered either as a sublingual tablet or spray, can complement anti-anginal therapy as part of optimal medical therapy in patients with refractory and recurrent angina either with or without myocardial revascularization, and is most commonly used to provide rapid therapeutic relief of acute recurrent angina attacks. When administered prophylactically, both formulations increase angina-free walking time on treadmill testing, abolish or delay ST segment depression, and increase exercise tolerance. The sublingual spray formulation provides several clinical advantages compared to tablet formulations, including a lower incidence of headache and superiority to the sublingual tablet in terms of therapeutic action and time to onset, while the magnitude and duration of vasodilatory action appears to be comparable. Furthermore, the sublingual spray formulation may be advantageous to tablet preparations in patients with dry mouth. This review discusses the efficacy and utility of short-acting nitroglycerin (sublingual spray and tablet) therapy for both preventing and aborting an acute angina attack, thereby leading to an improved quality of life. PMID:26316714
Hauck, Stefanie M; Lepper, Marlen F; Hertl, Michael; Sekundo, Walter; Deeg, Cornelia A
2017-10-01
Equine recurrent uveitis is the only spontaneous model for recurrent autoimmune uveitis in humans, where T cells target retinal proteins. Differences between normal and autoaggressive lymphocytes were identified in this study by analyzing peripheral blood derived lymphocytes (PBL) proteomes from the same case with interphotoreceptor retinoid binding protein induced uveitis sampled before (Day 0), during (Day 15), and after uveitic attack (Day 23). Relative protein abundances of PBL were investigated in a quantitative, label-free differential proteome analysis in cells that were kept frozen for 14 years since the initial experiment. Quantitative data could be acquired for 2632 proteins at all three time points. Profound changes (≥2-fold change) in PBL protein abundance were observed when comparing Day 0 with 15, representing acute inflammation (1070 regulated proteins) and Day 0 with 23 (cessation; 1571 regulated). Significant differences applied to proteins with functions in integrin signaling during active uveitis, involving "Erk and pi-3 kinase are necessary for collagen binding in corneal epithelia," "integrins in angiogenesis," and "integrin-linked kinase signaling" pathways. In contrast, at cessation of uveitic attack, significantly changed proteins belonged to pathways of "nongenotropic androgen signaling," "classical complement pathway," and "Amb2 integrin signaling." Several members of respective pathways were earlier shown to be changed in naturally occurring uveitis, underscoring the significance of these findings here and proofing the value of the induced model in mimicking spontaneous autoimmune uveitis. All MS data have been deposited to the ProteomeXchange consortium via the PRIDE partner repository (dataset identifier PXD005580). © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Harpur, Brock A; Zayed, Amro
2013-07-01
The genomes of eusocial insects have a reduced complement of immune genes-an unusual finding considering that sociality provides ideal conditions for disease transmission. The following three hypotheses have been invoked to explain this finding: 1) social insects are attacked by fewer pathogens, 2) social insects have effective behavioral or 3) novel molecular mechanisms for combating pathogens. At the molecular level, these hypotheses predict that canonical innate immune pathways experience a relaxation of selective constraint. A recent study of several innate immune genes in ants and bees showed a pattern of accelerated amino acid evolution, which is consistent with either positive selection or a relaxation of constraint. We studied the population genetics of innate immune genes in the honey bee Apis mellifera by partially sequencing 13 genes from the bee's Toll pathway (∼10.5 kb) and 20 randomly chosen genes (∼16.5 kb) sequenced in 43 diploid workers. Relative to the random gene set, Toll pathway genes had significantly higher levels of amino acid replacement mutations segregating within A. mellifera and fixed between A. mellifera and A. cerana. However, levels of diversity and divergence at synonymous sites did not differ between the two gene sets. Although we detect strong signs of balancing selection on the pathogen recognition gene pgrp-sa, many of the genes in the Toll pathway show signatures of relaxed selective constraint. These results are consistent with the reduced complement of innate immune genes found in social insects and support the hypothesis that some aspect of eusociality renders canonical innate immunity superfluous.
NASA Technical Reports Server (NTRS)
Hackett, J. E.; Sampath, S.; Phillips, C. G.
1981-01-01
A new, fast, non-iterative version of the "Wall Pressure Signature Method" is described and used to determine blockage and angle-of-attack wind tunnel corrections for highly-powered jet-flap models. The correction method is complemented by the application of tangential blowing at the tunnel floor to suppress flow breakdown there, using feedback from measured floor pressures. This tangential blowing technique was substantiated by subsequent flow investigations using an LV. The basic tests on an unswept, knee-blown, jet flapped wing were supplemented to include the effects of slat-removal, sweep and the addition of unflapped tips. C sub mu values were varied from 0 to 10 free-air C sub l's in excess of 18 were measured in some cases. Application of the new methods yielded corrected data which agreed with corresponding large tunnel "free air" resuls to within the limits of experimental accuracy in almost all cases. A program listing is provided, with sample cases.
Life and death of proteins: a case study of glucose-starved Staphylococcus aureus.
Michalik, Stephan; Bernhardt, Jörg; Otto, Andreas; Moche, Martin; Becher, Dörte; Meyer, Hanna; Lalk, Michael; Schurmann, Claudia; Schlüter, Rabea; Kock, Holger; Gerth, Ulf; Hecker, Michael
2012-09-01
The cellular amount of proteins not only depends on synthesis but also on degradation. Here, we expand the understanding of differential protein levels by complementing synthesis data with a proteome-wide, mass spectrometry-based stable isotope labeling with amino acids in cell culture analysis of protein degradation in the human pathogen Staphylococcus aureus during glucose starvation. Monitoring protein stability profiles in a wild type and an isogenic clpP protease mutant revealed that 1) proteolysis mainly affected proteins with vegetative functions, anabolic and selected catabolic enzymes, whereas the expression of TCA cycle and gluconeogenesis enzymes increased; 2) most proteins were prone to aggregation in the clpP mutant; 3) the absence of ClpP correlated with protein denaturation and oxidative stress responses, deregulation of virulence factors and a CodY repression. We suggest that degradation of redundant, inactive proteins disintegrated from functional complexes and thereby amenable to proteolytic attack is a fundamental cellular process in all organisms to regain nutrients and guarantee protein homeostasis.
Life and Death of Proteins: A Case Study of Glucose-starved Staphylococcus aureus*
Michalik, Stephan; Bernhardt, Jörg; Otto, Andreas; Moche, Martin; Becher, Dörte; Meyer, Hanna; Lalk, Michael; Schurmann, Claudia; Schlüter, Rabea; Kock, Holger; Gerth, Ulf; Hecker, Michael
2012-01-01
The cellular amount of proteins not only depends on synthesis but also on degradation. Here, we expand the understanding of differential protein levels by complementing synthesis data with a proteome-wide, mass spectrometry-based stable isotope labeling with amino acids in cell culture analysis of protein degradation in the human pathogen Staphylococcus aureus during glucose starvation. Monitoring protein stability profiles in a wild type and an isogenic clpP protease mutant revealed that 1) proteolysis mainly affected proteins with vegetative functions, anabolic and selected catabolic enzymes, whereas the expression of TCA cycle and gluconeogenesis enzymes increased; 2) most proteins were prone to aggregation in the clpP mutant; 3) the absence of ClpP correlated with protein denaturation and oxidative stress responses, deregulation of virulence factors and a CodY repression. We suggest that degradation of redundant, inactive proteins disintegrated from functional complexes and thereby amenable to proteolytic attack is a fundamental cellular process in all organisms to regain nutrients and guarantee protein homeostasis. PMID:22556279
Vortex shedding within laminar separation bubbles forming over an airfoil
NASA Astrophysics Data System (ADS)
Kirk, Thomas M.; Yarusevych, Serhiy
2017-05-01
Vortex shedding within laminar separation bubbles forming over the suction side of a NACA 0018 airfoil is studied through a combination of high-speed flow visualization and boundary layer measurements. Wind tunnel experiments are performed at a chord-based Reynolds number of 100,000 and four angles of attack. The high-speed flow visualization is complemented by quantitative velocity and surface pressure measurements. The structures are shown to originate from the natural amplification of small-amplitude disturbances, and the shear layer roll-up is found to occur coherently across the span. However, significant cycle-to-cycle variations are observed in vortex characteristics, including shedding period and roll-up location. The formation of the roll-up vortices precedes the later stages of transition, during which these structures undergo significant deformations and breakdown to smaller scales. During this stage of flow development, vortex merging is also observed. The results provide new insight into the development of coherent structures in separation bubbles and their relation to the overall bubble dynamics and mean bubble topology.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the basic PII number unchanged for the life of the instrument unless the conditions in paragraph (c... not in the Government's best interest solely for administrative reasons (e.g., when the supplementary... predecessor contract once issued; and (iv) Shall not evade competition, expand the scope of work, or extend...
Bruce, Toby J A
2015-02-01
In an environment with changing availability and quality of host plants, phytophagous insects are under selection pressure to find quality hosts. They need to maximize their fitness by locating suitable plants and avoiding unsuitable ones. Thus, they have evolved a finely tuned sensory system, for detection of host cues, and a nervous system, capable of integrating inputs from sensory neurons with a high level of spatio-temporal resolution. Insect responses to cues are not fixed but depend on the context in which they are perceived, the physiological state of the insect, and prior learning experiences. However, there are examples of insects making 'mistakes' and being attracted to poor quality hosts. While insects have evolved ways of finding hosts, plants have been under selection pressure to do precisely the opposite and evade detection or defend themselves when attacked. Once on the plant, insect-associated molecules may trigger or suppress defence depending on whether the plant or the insect is ahead in evolutionary terms. Plant volatile emission is influenced by defence responses induced by insect feeding or oviposition which can attract natural enemies but repel herbivores. Conversely, plant reproductive fitness is increased by attraction of pollinators. Interactions can be altered by other organisms associated with the plant such as other insects, plant pathogens, or mycorrhizal fungi. Plant phenotype is plastic and can be changed by epigenetic factors in adaptation to periods of biotic stress. Space and time play crucial roles in influencing the outcome of interactions between insects and plants. © The Author 2014. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Ohshima, K; Suzumiya, J; Sugihara, M; Nagafuchi, S; Ohga, S; Kikuchi, M
1999-01-01
The Epstein-Barr virus (EBV) induces infectious mononucleosis (IM) and can be associated with chronic active EBV infection (CAEBV). Cytotoxic T lymphocytes (CTL) play an important role in excluding EBV-infected cells. Two cytotoxic mechanisms of CTL have been demonstrated: one perforin/granzyme-based and the other Fas (CD95)/Fas ligand (FasL)-based. To clarify these two pathways in CAEBV, we analyzed six patients with CAEBV and four patients with IM using immunohistochemical staining of the lymph nodes. In both CAEBV and IM, CD8+ T-cells increased in number, but CD56+ natural killer cells were rare. In four of six cases with CAEBV, approximately half the lymphocytes were positive for T cell-restricted intracellular antigens (TIA-1), which were recognized by the cytolytic granules of CTL. In IM, the number of TIA-1 positive cells was smaller than that in CAEBV. Fas-positive lymphocytes were frequently encountered in both CAEBV and IM. However, FasL-positive lymphocytes increased in three of six patients with CAEBV, but not in patients with IM. Except for one case with CAEBV, the number of perforin- and/or granzyme-positive cells was small in number in both CAEBV and IM cases. In double-staining FasL and EBV in situ hybridization, FasL-positive EBV-infected lymphocytes were detected in CAEBV but not in IM. In CAEBV, the Fas/FasL pathway and not perforin pathways appears to play an important role in the pathogenesis. The data suggest that EBV-infected lymphocytes may evade immune attack through the expression of FasL.
Yang, Huiying; Ke, Yuehua; Wang, Jian; Tan, Yafang; Myeni, Sebenzile K; Li, Dong; Shi, Qinghai; Yan, Yanfeng; Chen, Hui; Guo, Zhaobiao; Yuan, Yanzhi; Yang, Xiaoming; Yang, Ruifu; Du, Zongmin
2011-11-01
A Yersinia pestis-human protein interaction network is reported here to improve our understanding of its pathogenesis. Up to 204 interactions between 66 Y. pestis bait proteins and 109 human proteins were identified by yeast two-hybrid assay and then combined with 23 previously published interactions to construct a protein-protein interaction network. Topological analysis of the interaction network revealed that human proteins targeted by Y. pestis were significantly enriched in the proteins that are central in the human protein-protein interaction network. Analysis of this network showed that signaling pathways important for host immune responses were preferentially targeted by Y. pestis, including the pathways involved in focal adhesion, regulation of cytoskeleton, leukocyte transendoepithelial migration, and Toll-like receptor (TLR) and mitogen-activated protein kinase (MAPK) signaling. Cellular pathways targeted by Y. pestis are highly relevant to its pathogenesis. Interactions with host proteins involved in focal adhesion and cytoskeketon regulation pathways could account for resistance of Y. pestis to phagocytosis. Interference with TLR and MAPK signaling pathways by Y. pestis reflects common characteristics of pathogen-host interaction that bacterial pathogens have evolved to evade host innate immune response by interacting with proteins in those signaling pathways. Interestingly, a large portion of human proteins interacting with Y. pestis (16/109) also interacted with viral proteins (Epstein-Barr virus [EBV] and hepatitis C virus [HCV]), suggesting that viral and bacterial pathogens attack common cellular functions to facilitate infections. In addition, we identified vasodilator-stimulated phosphoprotein (VASP) as a novel interaction partner of YpkA and showed that YpkA could inhibit in vitro actin assembly mediated by VASP.
Identity of the segment of human complement C8 recognized by complement regulatory protein CD59.
Lockert, D H; Kaufman, K M; Chang, C P; Hüsler, T; Sodetz, J M; Sims, P J
1995-08-25
CD59 antigen is a membrane glycoprotein that inhibits the activity of the C5b-9 membrane attack complex (MAC), thereby protecting human cells from lysis by human complement. The inhibitory function of CD59 derives from its capacity to interact with both the C8 and C9 components of MAC, preventing assembly of membrane-inserted C9 polymer. MAC-inhibitory activity of CD59 is species-selective and is most effective when both C8 and C9 derive from human or other primate plasma. Rabbit C8 and C9, which can substitute for human C8 and C9 in MAC, mediate virtually unrestricted lysis of human cells expressing CD59. In order to identify the segment of human C8 that is recognized by CD59, recombinant peptides containing human or rabbit C8 sequence were expressed in Escherichia coli and purified. CD59 was found to specifically bind to a peptide corresponding to residues 334-385 of the human C8 alpha-subunit, and to require a disulfide bond between Cys345 and Cys369. No specific binding was observed to the corresponding sequence from rabbit C8 alpha (residues 334-386). To obtain functional evidence that this segment of human C8 alpha is selectively recognized by CD59, recombinant C8 proteins were prepared by co-transfecting COS-7 cells with human/rabbit chimeras of the C8 alpha cDNA, and cDNAs encoding the C8 beta and C8 gamma chains. Hemolytic activity of MAC formed with chimeric C8 was analyzed using target cells reconstituted with CD59. These experiments confirmed that CD59 recognizes a conformationally sensitive epitope that is within a segment of human C8 alpha internal to residues 320-415. Our data also suggest that optimal interaction of CD59 with this segment of human C8 alpha is influenced by N-terminal flanking sequence in C8 alpha and by human C8 beta, but is unaffected by C8 gamma.
Zhang, Jia-xiang; Zha, Wan-sheng; Ye, Liang-ping; Wang, Feng; Wang, Hui; Shen, Tong; Wu, Chang-hao; Zhu, Qi-xing
2016-02-01
We have previously shown complement activation as a possible mechanism for trichloroethylene (TCE) sensitization, leading to multi-organ damage including the kidneys. In particular, excessive deposition of C5 and C5b-9-the membrane attack complex, which can generate significant tissue damage, was observed in the kidney tissue after TCE sensitization. The present study tested the hypothesis that anaphylatoxin C5a binding to its receptor C5aR mediates renal injury in TCE-sensitized BALB/c mice. BALB/c mice were sensitized through skin challenge with TCE, with or without pretreatment by the C5aR antagonist W54011. Kidney histopathology and the renal functional test were performed to assess renal injury, and immunohistochemistry and fluorescent labeling were carried out to assess C5a and C5aR expressions. TCE sensitization up-regulated C5a and C5aR expressions in kidney tissue, generated inflammatory infiltration, renal tubule damage, glomerular hypercellularity and impaired renal function. Antagonist pretreatment blocked C5a binding to C5aR and attenuated TCE-induced tissue damage and renal dysfunction. TCE sensitization also caused the deposition of major pro-inflammatory cytokines IL-2, TNF-α and IFN-γ in the kidney tissue (P < 0.05); this was accompanied by increased expression of P-p38, P-ERK and P-JNK proteins (P < 0.05). Pretreatment with the C5aR antagonist attenuated the increase of expression of P-p38, P-ERK and P-JNK proteins (P < 0.05) and also consistently reduced the TCE sensitization-induced increase of IL-2, TNF-α and IFN-γ (P < 0.05). These data identify C5a binding to C5aR, MAP kinase activation, and inflammatory cytokine release as a novel mechanism for complement-mediated renal injury by sensitization with TCE or other environmental chemicals. Copyright © 2015 John Wiley & Sons, Ltd.
Forensic Analysis of Cites-Protected Dalbergia Timber from the Americas
Edgard O. Espinoza; Michael C. Wiemann; Josefina Barajas-Morales; Gabriela D. Chavarria; Pamela J. McClure
2015-01-01
Species identification of logs, planks, and veneers is difficult because they lack the traditional descriptors such as leaves and flowers. An additional challenge is that many transnational shipments have unreliable geographic provenance. Therefore, frequently the lowest taxonomic determination is genus, which allows unscrupulous importers to evade the endangered...
8 CFR 207.7 - Derivatives of refugees.
Code of Federal Regulations, 2014 CFR
2014-01-01
... least 2 years; (3) A stepchild, if the marriage that created this relationship took place after the... marriage ceremony, and the marriage was not consummated (section 101(a)(35) of the Act); (5) A husband or... marriage for the purpose of evading immigration laws; and (6) A parent, sister, brother, grandparent...
8 CFR 207.7 - Derivatives of refugees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... least 2 years; (3) A stepchild, if the marriage that created this relationship took place after the... marriage ceremony, and the marriage was not consummated (section 101(a)(35) of the Act); (5) A husband or... marriage for the purpose of evading immigration laws; and (6) A parent, sister, brother, grandparent...
8 CFR 207.7 - Derivatives of refugees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... least 2 years; (3) A stepchild, if the marriage that created this relationship took place after the... marriage ceremony, and the marriage was not consummated (section 101(a)(35) of the Act); (5) A husband or... marriage for the purpose of evading immigration laws; and (6) A parent, sister, brother, grandparent...
Evading Equity: Principal Autonomy under the Bloomberg-Klein Market Regime
ERIC Educational Resources Information Center
Lewis-Durham, Tiffanie C.
2015-01-01
Using New York City schools as a case study, this study draws on interview data from principals, district consultants and administrators, and principal's union representatives to explore the relationship between market-based reform and colorblindness in educational policy. The study is informed by colorblindness theory, which explores the subtle…
Y-Trap Cancer Immunotherapy Drug Targets Two Proteins
Two groups of researchers, working independently, have fused a TGF-beta receptor to a monoclonal antibody that targets a checkpoint protein. The result, this Cancer Currents blog describes, is a single hybrid molecule called a Y-trap that blocks two pathways used by tumors to evade the immune system.
USDA-ARS?s Scientific Manuscript database
Bacteria employ various strategies to evade protozoan predation, including production and release of bioactive compounds. This capability may be instrumental in determining bacterial resistance to protozoan grazing, thereby enhancing survival of producing strains in soil environments. A limited numb...
ERIC Educational Resources Information Center
Turner, V. Kelly; Benessaiah, Karina; Warren, Scott; Iwaniec, David
2015-01-01
Scholars have enumerated unique challenges to collaborative interdisciplinary research, many of which evade prescriptive solutions. Some of these challenges can be understood as "essential tensions," necessary and persistent contradictory imperatives in the scientific process. Drawing from interviews with internationally renowned…
Tapping in to Fury and Passion
ERIC Educational Resources Information Center
Marshall, Catherine
2006-01-01
Confusion and furies about issues such as gender and sexuality present themselves as counternarratives about schooling. Rather than treat them as situations for educational administrators to manage or evade, the author proposes to use these counternarratives to fundamentally reframe educational leadership to be a profession proud of and skilled at…
31 CFR 585.214 - Evasions; attempts; conspiracies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evasions; attempts; conspiracies. 585... Prohibitions § 585.214 Evasions; attempts; conspiracies. Any transaction for the purpose of, or which has the effect of, evading or avoiding, or which facilitates the evasion or avoidance of, any of the prohibitions...
31 CFR 560.203 - Evasions; attempts.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evasions; attempts. 560.203 Section 560.203 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Evasions; attempts. Any transaction by any United States person or within the United States that evades or...
31 CFR 597.204 - Evasions; attempts; conspiracies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evasions; attempts; conspiracies. 597... REGULATIONS Prohibitions § 597.204 Evasions; attempts; conspiracies. Any transaction for the purpose of, or which has the effect of, evading or avoiding, or which facilitates the evasion or avoidance of, any of...
31 CFR 536.204 - Evasions; attempts; conspiracies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evasions; attempts; conspiracies. 536... Prohibitions § 536.204 Evasions; attempts; conspiracies. Any transaction for the purpose of, or which has the effect of, evading or avoiding, or which facilitates the evasion or avoidance of, any of the prohibitions...
31 CFR 575.211 - Evasions; attempts; conspiracies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evasions; attempts; conspiracies. 575... § 575.211 Evasions; attempts; conspiracies. Any transaction for the purpose of, or which has the effect of, evading or avoiding, or which facilitates the evasion or avoidance of, any of the prohibitions...
31 CFR 596.202 - Evasions; attempts; conspiracies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Evasions; attempts; conspiracies. 596... REGULATIONS Prohibitions § 596.202 Evasions; attempts; conspiracies. Any transaction for the purpose of, or which has the effect of, evading or avoiding, or which facilitates the evasion or avoidance of, any of...
31 CFR 592.202 - Evasions; attempts; conspiracies.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Prohibitions § 592.202 Evasions; attempts; conspiracies. (a) Notwithstanding the existence of any rights or... purpose of evading or avoiding, or attempts to violate, any of the prohibitions set forth in this part is prohibited. (b) Notwithstanding the existence of any rights or obligations conferred or imposed by any...
Institutional Autonomy Revisited: Autonomy Justified and Accounted
ERIC Educational Resources Information Center
Moses, Ingrid
2007-01-01
Australian universities have enjoyed large-scale autonomy. In a society that increasingly regards university education from an instrumentalist point of view, universities' anxious safeguarding of their autonomy is widely seen as an attempt to evade accountability. Yet there has been an acceptance that a corollary to autonomy is accountability.…
School and College Students' Attitudes toward Military Service
ERIC Educational Resources Information Center
Shevtsov, V. V.
2007-01-01
In the past few years there has been a considerable increase in the number of conscientious objectors and people evading military service. In order to make the necessary administrative decisions, organize military and patriotic indoctrination, and provide for professional military fitness it is vital to have knowledge about attitudes toward…
Chen, Shun; Yang, Chao; Zhang, Wei; Mahalingam, Suresh; Wang, Mingshu; Cheng, Anchun
2018-05-06
Infections with viruses in the Flaviviridae family have a vast global and economic impact because of the high morbidity and mortality. The pathogenesis of Flaviviridae infections is very complex and not fully understood because these viruses can inhibit multiple immune pathways including the complement system, NK cells, and IFN induction and signalling pathways. The non-structural (NS) 5 and 5A proteins of Flaviviridae viruses are highly conserved and play an important role in resisting host immunity through various evasion mechanisms. This review summarizes the strategies used by the NS5 and 5A proteins of Flaviviridae viruses for evading the innate immune response by inhibiting pattern recognition receptor (PRR) signalling pathways (TLR/MyD88, IRF7), suppressing interferon (IFN) signalling pathways (IFN-γRs, STAT1, STAT2), and impairing the function of IFN-stimulated genes (ISGs) (e.g. protein kinase R [PKR], oligoadenylate synthase [OAS]). All of these immune evasion mechanisms depend on the interaction of NS5 or NS5A with cellular proteins, such as MyD88 and IRF7, IFN-αRs, IFN-γRs, STAT1, STAT2, PKR and OAS. NS5 is the most attractive target for the discovery of broad spectrum compounds against Flaviviridae virus infection. The methyltransferase (MTase) and RNA-dependent RNA polymerase (RdRp) activities of NS5 are the main therapeutic targets for antiviral drugs against Flaviviridae virus infection. Based on our site mapping, the sites involved in immune evasion provide some potential and promising targets for further novel antiviral therapeutics. Copyright © 2018 Elsevier Inc. All rights reserved.
Seib, K L; Serruto, D; Oriente, F; Delany, I; Adu-Bobie, J; Veggi, D; Aricò, B; Rappuoli, R; Pizza, M
2009-01-01
Factor H-binding protein (fHBP; GNA1870) is one of the antigens of the recombinant vaccine against serogroup B Neisseria meningitidis, which has been developed using reverse vaccinology and is the basis of a meningococcal B vaccine entering phase III clinical trials. Binding of factor H (fH), an inhibitor of the complement alternative pathway, to fHBP enables N. meningitidis to evade killing by the innate immune system. All fHBP null mutant strains analyzed were sensitive to killing in ex vivo human whole blood and serum models of meningococcal bacteremia with respect to the isogenic wild-type strains. The fHBP mutant strains of MC58 and BZ83 (high fHBP expressors) survived in human blood and serum for less than 60 min (decrease of >2 log(10) CFU), while NZ98/254 (intermediate fHBP expressor) and 67/00 (low fHBP expressor) showed decreases of >1 log(10) CFU after 60 to 120 min of incubation. In addition, fHBP is important for survival in the presence of the antimicrobial peptide LL-37 (decrease of >3 log(10) CFU after 2 h of incubation), most likely due to electrostatic interactions between fHBP and the cationic LL-37 molecule. Hence, the expression of fHBP by N. meningitidis strains is important for survival in human blood and human serum and in the presence of LL-37, even at low levels. The functional significance of fHBP in mediating resistance to the human immune response, in addition to its widespread distribution and its ability to induce bactericidal antibodies, indicates that it is an important component of the serogroup B meningococcal vaccine.
Cuckoos versus hosts in insects and birds: adaptations, counter-adaptations and outcomes.
Kilner, Rebecca M; Langmore, Naomi E
2011-11-01
Avian parents and social insect colonies are victimized by interspecific brood parasites-cheats that procure costly care for their dependent offspring by leaving them in another species' nursery. Birds and insects defend themselves from attack by brood parasites; their defences in turn select counter-strategies in the parasite, thus setting in motion antagonistic co-evolution between the two parties. Despite their considerable taxonomic disparity, here we show striking parallels in the way that co-evolution between brood parasites and their hosts proceeds in insects and birds. First, we identify five types of co-evolutionary arms race from the empirical literature, which are common to both systems. These are: (a) directional co-evolution of weaponry and armoury; (b) furtiveness in the parasite countered by strategies in the host to expose the parasite; (c) specialist parasites mimicking hosts who escape by diversifying their genetic signatures; (d) generalist parasites mimicking hosts who escape by favouring signatures that force specialization in the parasite; and (e) parasites using crypsis to evade recognition by hosts who then simplify their signatures to make the parasite more detectable. Arms races a and c are well characterized in the theoretical literature on co-evolution, but the other types have received little or no formal theoretical attention. Empirical work suggests that hosts are doomed to lose arms races b and e to the parasite, in the sense that parasites typically evade host defences and successfully parasitize the nest. Nevertheless hosts may win when the co-evolutionary trajectory follows arms race a, c or d. Next, we show that there are four common outcomes of the co-evolutionary arms race for hosts. These are: (1) successful resistance; (2) the evolution of defence portfolios (or multiple lines of resistance); (3) acceptance of the parasite; and (4) tolerance of the parasite. The particular outcome is not determined by the type of preceding arms race but depends more on whether hosts or parasites control the co-evolutionary trajectory: tolerance is an outcome that parasites inflict on hosts, whereas the other three outcomes are more dependent on properties intrinsic to the host species. Finally, our review highlights considerable interspecific variation in the complexity and depth of host defence portfolios. Whether this variation is adaptive or merely reflects evolutionary lag is unclear. We propose an adaptive explanation, which centres on the relative strength of two opposing processes: strategy-facilitation, in which one line of host defence promotes the evolution of another form of resistance, and strategy-blocking, in which one line of defence may relax selection on another so completely that it causes it to decay. We suggest that when strategy-facilitation outweighs strategy-blocking, hosts will possess complex defence portfolios and we identify selective conditions in which this is likely to be the case. © 2011 The Authors. Biological Reviews © 2011 Cambridge Philosophical Society.
Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks
NASA Astrophysics Data System (ADS)
Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai
2017-09-01
Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.
ERIC Educational Resources Information Center
Mowatt, Rasul A.; Johnson, Corey W.; Roberts, Nina S.; Kivel, B. Dana
2016-01-01
The recruitment and retention of faculty and students of color is a long-standing challenge in academic programs focusing on leisure studies, parks, recreation, and tourism. However, when confronting the predominantly white composition of educational programs, many evade or, at most, acknowledge the situation as a "deficit." Few offer…
Arab EFL Learners' Writing Dilemma at Tertiary Level
ERIC Educational Resources Information Center
Ezza, El-Sadig
2010-01-01
There is a general belief among researchers and speakers at conferences and symposia that Arab EFL Learners are primarily responsible for their weak writing performance. Educational policies usually evade criticism. This study is an attempt to show that educational policies can have their role in the learner's writing problems. Viz. it posits that…
ERIC Educational Resources Information Center
Chaudhary, Nandita; Pillai, Punya
2016-01-01
Conventional psychological research has focused primarily on intrapersonal dimensions of human activity, often evading shared knowledge, interpersonal perspective-taking, and collective beliefs. The ideology of individualism and the 'embryonic fallacy' are largely responsible for the focus on the individual as an isolated entity. Most available…
SYNTHESIS AND MUTAGENIC PROPERTIES OF 4,4'-DIAMINO-PARA-TERPHENYL AND 4,4'-DIAMINO-PARA-QUATERPHENYL
DBPs in drinking water can be controlled by the type of treatment and by knowing andd controlling major sources of DBP toxicant precursors and toxicants that "evade" treatment processes. Efforts are being directed at one category at a time. The initial precursor categories to be ...
26 CFR 1.267(f)-1 - Controlled groups.
Code of Federal Regulations, 2010 CFR
2010-04-01
... § 1.1502-13. See also, sections 269 (acquisitions to evade or avoid income tax) and 482 (allocations... is engaged in or structured with a principal purpose to avoid the purposes of this section (including, for example, by avoiding treatment as an intercompany sale or by distorting the timing of losses or...
The Golden Bough: Literature and the Idea of Immortality.
ERIC Educational Resources Information Center
Klotz, Kenneth
1979-01-01
All works of literature reflect man's obsession with death and his creative attempts to evade or postpone it. Art cannot solve the problem, but within the limits of human capabilities, we come to art, whether as artists or audience, for our own small share in the "intimations of immortality." (Author/SJL)
Epithelial self-defense against cancer.
Yamauchi, Hajime; Fujita, Yasuyuki
2012-11-01
It is not clearly understood what happens at the interface between normal and transformed epithelial cells at the first step of carcinogenesis. A recent study reveals that the organized epithelial structure suppresses clonal expansion of transformed cells. Translocation from the epithelium or perturbation of intercellular adhesions may be required for transformed cells to evade the suppressive environments.
U. S. Naval Forces Vietnam Monthly Historical Summary for July 1966
1966-09-06
to come out lor inspection they frequently evaded ssarch by running in to the beech where the occupants fled to nearby protective rocks or trees ...results during July. On 21 July, PGM 601 engineering personnel worked throughout the night to replace a main engine camshaft . Timely completion of the
Michael C. Wiemann; Edgard O. Espinoza
2017-01-01
To evade endangered timber species laws, unscrupulous importers sometimes attempt to pass protected Dalbergia nigra as look-alike but unprotected, Dalbergia Spruceana. Wood density and fluorescence properties are sometimes used to identify the species. Although these properties are useful and do not require special equipment,...
Beyond Black: The Louise Nevelson Project
ERIC Educational Resources Information Center
Wayne, Dale
2012-01-01
Louise Nevelson, who is called the "architect of shadow," was a "dumpster diver" of her time, collecting found objects in the wee hours of the morning before trash pickup. Recognition evaded Nevelson until she created "Mood Garden + One" (1958), when she was almost 60 years old. In this article, students create their own assemblage using…
A SNARE-like protein and biotin are implicated in soybean cyst nematode virulence
USDA-ARS?s Scientific Manuscript database
Some phytoparasitic nematodes have the ability to infect and reproduce on plants that are normally considered resistant to nematode infection. Such nematodes are referred to as virulent and the mechanisms they use to evade or suppress host plant defenses are not well understood. Here, we report the ...
32 CFR 1642.4 - Ineligibility for Class 3-A.
Code of Federal Regulations, 2014 CFR
2014-07-01
... specifically for the purpose of evading training and service; or (2) He acquired excessive financial... dependents of persons who are serving in the Armed Forces; or (7) The hardship to the dependent is based upon... dependents of persons who are serving in the Armed Forces. (b) [Reserved] [47 FR 4658, Feb. 1, 1982, as...
32 CFR 1642.4 - Ineligibility for Class 3-A.
Code of Federal Regulations, 2013 CFR
2013-07-01
... specifically for the purpose of evading training and service; or (2) He acquired excessive financial... dependents of persons who are serving in the Armed Forces; or (7) The hardship to the dependent is based upon... dependents of persons who are serving in the Armed Forces. (b) [Reserved] [47 FR 4658, Feb. 1, 1982, as...
32 CFR 1642.4 - Ineligibility for Class 3-A.
Code of Federal Regulations, 2011 CFR
2011-07-01
... specifically for the purpose of evading training and service; or (2) He acquired excessive financial... dependents of persons who are serving in the Armed Forces; or (7) The hardship to the dependent is based upon... dependents of persons who are serving in the Armed Forces. (b) [Reserved] [47 FR 4658, Feb. 1, 1982, as...
32 CFR 1642.4 - Ineligibility for Class 3-A.
Code of Federal Regulations, 2012 CFR
2012-07-01
... specifically for the purpose of evading training and service; or (2) He acquired excessive financial... dependents of persons who are serving in the Armed Forces; or (7) The hardship to the dependent is based upon... dependents of persons who are serving in the Armed Forces. (b) [Reserved] [47 FR 4658, Feb. 1, 1982, as...
32 CFR 1642.4 - Ineligibility for Class 3-A.
Code of Federal Regulations, 2010 CFR
2010-07-01
... specifically for the purpose of evading training and service; or (2) He acquired excessive financial... dependents of persons who are serving in the Armed Forces; or (7) The hardship to the dependent is based upon... dependents of persons who are serving in the Armed Forces. (b) [Reserved] [47 FR 4658, Feb. 1, 1982, as...
26 CFR 1.411(b)-1 - Accrued benefit requirements.
Code of Federal Regulations, 2013 CFR
2013-04-01
... classifications of employees, or separately satisfy one method with respect to the accrued benefits for each such classification, provided that such classifications are not so structured as to evade the accrued benefit... meaning of section 410(a)(3)(A)) which are not separated by a break in service (within the meaning of...
Academic Oral Presentation Self-Efficacy: A Cross-Sectional Interdisciplinary Comparative Study
ERIC Educational Resources Information Center
Amirian, Seyed Mohammad Reza; Tavakoli, Elaheh
2016-01-01
Despite the significant role of oral presentation in the academic context, many university students evade opportunities for participation due to low self-efficacy. The present study has been conducted to compare oral presentation self-efficacy of English as a Foreign Language (EFL) learners with undergraduates and postgraduates of Non-EFL majors,…
7 CFR 795.17 - Scheme or device.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...
7 CFR 701.36 - Schemes and devices and claims avoidances.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Schemes and devices and claims avoidances. 701.36... RELATED PROGRAMS PREVIOUSLY ADMINISTERED UNDER THIS PART § 701.36 Schemes and devices and claims..., any scheme or device designed to evade the maximum cost-share limitation that applies to the ECP or to...
7 CFR 795.17 - Scheme or device.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 7 2011-01-01 2011-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...
7 CFR 795.17 - Scheme or device.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 7 2013-01-01 2013-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...
7 CFR 795.17 - Scheme or device.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...
7 CFR 795.17 - Scheme or device.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...
Optimists' Creed: Brave New Cyberlearning, Evolving Utopias (Circa 2041)
ERIC Educational Resources Information Center
Burleson, Winslow; Lewis, Armanda
2016-01-01
This essay imagines the role that artificial intelligence innovations play in the integrated living, learning and research environments of 2041. Here, in 2041, in the context of increasingly complex wicked challenges, whose solutions by their very nature continue to evade even the most capable experts, society and technology have co-evolved to…
NASA Astrophysics Data System (ADS)
Harrell, Lee; Moore, Eric; Lee, Sanggap; Hickman, Steven; Marohn, John
2011-03-01
We present data and theoretical signal and noise calculations for a protocol using parametric amplification to evade the inherent tradeoff between signal and detector frequency noise in force-gradient magnetic resonance force microscopy signals, which are manifested as a modulated frequency shift of a high- Q microcantilever. Substrate-induced frequency noise has a 1 / f frequency dependence, while detector noise exhibits an f2 dependence on modulation frequency f . Modulation of sample spins at a frequency that minimizes these two contributions typically results in a surface frequency noise power an order of magnitude or more above the thermal limit and may prove incompatible with sample spin relaxation times as well. We show that the frequency modulated force-gradient signal can be used to excite the fundamental resonant mode of the cantilever, resulting in an audio frequency amplitude signal that is readily detected with a low-noise fiber optic interferometer. This technique allows us to modulate the force-gradient signal at a sufficiently high frequency so that substrate-induced frequency noise is evaded without subjecting the signal to the normal f2 detector noise of conventional demodulation.
Barnett, Timothy C.; Liebl, David; Seymour, Lisa M.; Gillen, Christine M.; Lim, Jin Yan; LaRock, Christopher N.; Davies, Mark R.; Schulz, Benjamin L.; Nizet, Victor; Teasdale, Rohan D.; Walker, Mark J.
2014-01-01
SUMMARY Autophagy is reported to be an important innate immune defence against the intracellular bacterial pathogen Group A Streptococcus (GAS). However, the GAS strains examined to-date belong to serotypes infrequently associated with human disease. We find that the globally disseminated serotype M1T1 clone of GAS can evade autophagy and replicate efficiently in the cytosol of infected cells. Cytosolic M1T1 GAS (strain 5448), but not M6 GAS (strain JRS4), avoids ubiquitylation and recognition by the host autophagy marker LC3 and ubiquitin-LC3 adaptor proteins NDP52, p62 and NBR1. Expression of SpeB, a streptococcal cysteine protease, is critical for this process, as an isogenic M1T1 ΔspeB mutant is targeted to autophagy and attenuated for intracellular replication. SpeB degrades p62, NDP52 and NBR1 in vitro and within the host cell cytosol. These results uncover a proteolytic mechanism utilized by GAS to escape the host autophagy pathway which may underpin the success of the M1T1 clone. PMID:24331465
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bentz, Gretchen L.; Liu Renshui; Hahn, Angela M.
Activation of interferon regulatory factors (IRFs) 3 and 7 is essential for the induction of Type I interferons (IFN) and innate antiviral responses, and herpesviruses have evolved mechanisms to evade such responses. We previously reported that Epstein-Barr virus BZLF1, an immediate-early (IE) protein, inhibits the function of IRF7, but the role of BRLF1, the other IE transactivator, in IRF regulation has not been examined. We now show that BRLF1 expression decreased induction of IFN-{beta}, and reduced expression of IRF3 and IRF7; effects were dependent on N- and C-terminal regions of BRLF1 and its nuclear localization signal. Endogenous IRF3 and IRF7more » RNA and protein levels were also decreased during cytolytic EBV infection. Finally, production of IFN-{beta} was decreased during lytic EBV infection and was associated with increased susceptibility to superinfection with Sendai virus. These data suggest a new role for BRLF1 with the ability to evade host innate immune responses.« less
Close, but no cigar: certain cigars are pseudo-cigarettes designed to evade regulation
Delnevo, Cristine D; Hrywna, Mary; Giovenco, Daniel P; Lo, Erin J Miller; O’Connor, Richard J
2017-01-01
An abundance of evidence suggests that the tobacco industry’s response to increased regulation imposed on cigarettes has been the development of little cigars and filtered cigars which are tobacco products that are merely cigarettes in disguise. Emphasising these products’ physical attributes, the tobacco industry has offered cigar products to its consumers as pseudo-cigarettes. For decades, tobacco manufacturers’ response to increased cigarette regulation and taxation has been to exploit policy loopholes by offering these little cigars and filtered cigars pseudo-cigarettes that are exempted from this regulatory oversight. As a result, in spite of increased regulations and taxes on cigarettes, smokers can purchase cigars that are almost physically indistinguishable from their cigarettes at a lower cost. This commentary describes the recent evolution of the cigar market in response to federal regulation, and highlights historical cigar industry attempts to evade taxation, capitalise on product features that are off-limits to cigarettes, and capture the shrinking market of cigarette smokers. We present the case that little cigars and filtered cigars, differing very little physically from cigarettes, are products deserving the same regulatory scrutiny. PMID:27220622
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kwun, Hyun Jin; Ramos da Silva, Suzane; Department of Pathology, Botucatu School of Medicine at Sao Paulo State University, Sao Paulo
KSHV LANA1, a latent protein expressed during chronic infection to maintain a viral genome, inhibits major histocompatibility complex class I (MHC I) peptide presentation in cis as a means of immune evasion. Through deletional cloning, we localized this function to the LANA1 central repeat 1 (CR1) subregion. Other CR subregions retard LANA1 translation and proteasomal processing but do not markedly inhibit LANA1 peptide processing by MHC I. Inhibition of proteasomal processing ablates LANA1 peptide presentation. Direct expression of LANA1 within the endoplasmic reticulum (ER) overcomes CR1 inhibition suggesting that CR1 acts prior to translocation of cytoplasmic peptides into the ER.more » By physically separating CR1 from other subdomains, we show that LANA1 evades MHC I peptide processing by a mechanism distinct from other herpesviruses including Epstein-Barr virus (EBV). Although LANA1 and EBV EBNA1 are functionally similar, they appear to use different mechanisms to evade host cytotoxic T lymphocyte surveillance.« less
Non-transferable signals on ant queen eggs
NASA Astrophysics Data System (ADS)
D'Ettorre, Patrizia; Tofilski, Adam; Heinze, Jürgen; Ratnieks, Francis L. W.
2006-03-01
How biological systems resolve internal conflicts is a major evolutionary question. Social insect workers cooperate but also pursue individual interests, such as laying male eggs. The rewards of this individual selfishness can be reduced by policing, such as by killing worker-laid eggs. However, selfish individuals may evade policing. What factors prevent individuals from being able to evade policing? In the ant Pachycondyla inversa, workers kill (police) worker-laid eggs. Because the colony keeps eggs in piles and worker-laid and queen-laid eggs are chemically distinct, worker-laid eggs might become more acceptable once placed in the egg pile by odour transfer from touching queen-laid eggs. Here, we show that such “cue scrambling” does not occur. Worker-laid eggs that were sandwiched between three queen-laid eggs for 45 min were not more acceptable in a policing bioassay than control worker-laid eggs. Chemical analyses also showed that the surface hydrocarbon profile of these eggs was unchanged. Policing, therefore, is stable against this potential cheating mechanism probably because queen-laid eggs are made chemically distinct using chemicals, that are not easily transferred by physical contact.
Non-transferable signals on ant queen eggs.
D'Ettorre, Patrizia; Tofilski, Adam; Heinze, Jürgen; Ratnieks, Francis L W
2006-03-01
How biological systems resolve internal conflicts is a major evolutionary question. Social insect workers cooperate but also pursue individual interests, such as laying male eggs. The rewards of this individual selfishness can be reduced by policing, such as by killing worker-laid eggs. However, selfish individuals may evade policing. What factors prevent individuals from being able to evade policing? In the ant Pachycondyla inversa, workers kill (police) worker-laid eggs. Because the colony keeps eggs in piles and worker-laid and queen-laid eggs are chemically distinct, worker-laid eggs might become more acceptable once placed in the egg pile by odour transfer from touching queen-laid eggs. Here, we show that such "cue scrambling" does not occur. Worker-laid eggs that were sandwiched between three queen-laid eggs for 45 min were not more acceptable in a policing bioassay than control worker-laid eggs. Chemical analyses also showed that the surface hydrocarbon profile of these eggs was unchanged. Policing, therefore, is stable against this potential cheating mechanism probably because queen-laid eggs are made chemically distinct using chemicals, that are not easily transferred by physical contact.
Scaling laws describe memories of host-pathogen riposte in the HIV population.
Barton, John P; Kardar, Mehran; Chakraborty, Arup K
2015-02-17
The enormous genetic diversity and mutability of HIV has prevented effective control of this virus by natural immune responses or vaccination. Evolution of the circulating HIV population has thus occurred in response to diverse, ultimately ineffective, immune selection pressures that randomly change from host to host. We show that the interplay between the diversity of human immune responses and the ways that HIV mutates to evade them results in distinct sets of sequences defined by similar collectively coupled mutations. Scaling laws that relate these sets of sequences resemble those observed in linguistics and other branches of inquiry, and dynamics reminiscent of neural networks are observed. Like neural networks that store memories of past stimulation, the circulating HIV population stores memories of host-pathogen combat won by the virus. We describe an exactly solvable model that captures the main qualitative features of the sets of sequences and a simple mechanistic model for the origin of the observed scaling laws. Our results define collective mutational pathways used by HIV to evade human immune responses, which could guide vaccine design.
Da Silva, Diane M; Movius, Carly A; Raff, Adam B; Brand, Heike E; Skeate, Joseph G; Wong, Michael K; Kast, W Martin
2014-03-01
Human papillomavirus (HPV) has evolved mechanisms that allow it to evade the human immune system. Studies have shown HPV-mediated suppression of activation of Langerhans cells (LC) is a key mechanism through which HPV16 evades initial immune surveillance. However, it has not been established whether high- and low-risk mucosal and cutaneous HPV genotypes share a common mechanism of immune suppression. Here, we demonstrate that LC exposed to capsids of HPV types 18, 31, 45, 11, (alpha-papillomaviruses) and HPV5 (beta-papillomavirus) similarly suppress LC activation, including lack of costimulatory molecule expression, lack of cytokine and chemokine secretion, lack of migration, and deregulated cellular signaling. In contrast, HPV1 (mu-papillomavirus) induced costimulatory molecule and cytokine upregulation, but LC migration and cellular signaling was suppressed. These results suggest that alpha and beta HPV genotypes, and partially a mu genotype, share a conserved mechanism of immune escape that enables these viruses to remain undetected in the absence of other inflammatory events. Copyright © 2014 Elsevier Inc. All rights reserved.
The contribution of collective attack tactics in differentiating handball score efficiency.
Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka
2004-12-01
The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.
Xu, Weihui; Meng, Yan; Surana, Priyanka; Fuerst, Greg; Nettleton, Dan; Wise, Roger P.
2015-01-01
Plants have evolved complex regulatory mechanisms to control a multi-layered defense response to microbial attack. Both temporal and spatial gene expression are tightly regulated in response to pathogen ingress, modulating both positive and negative control of defense. BLUFENSINs, small knottin-like peptides in barley, wheat, and rice, are highly induced by attack from fungal pathogens, in particular, the obligate biotrophic fungus, Blumeria graminis f. sp. hordei (Bgh), causal agent of barley powdery mildew. Previous research indicated that Blufensin1 (Bln1) functions as a negative regulator of basal defense mechanisms. In the current report, we show that BLN1 and BLN2 can both be secreted to the apoplast and Barley stripe mosaic virus (BSMV)-mediated overexpression of Bln2 increases susceptibility of barley to Bgh. Bimolecular fluorescence complementation (BiFC) assays signify that BLN1 and BLN2 can interact with each other, and with calmodulin. We then used BSMV-induced gene silencing to knock down Bln1, followed by Barley1 GeneChip transcriptome analysis, to identify additional host genes influenced by Bln1. Analysis of differential expression revealed a gene set enriched for those encoding proteins annotated to nuclear import and the secretory pathway, particularly Importin α1-b and Sec61 γ subunits. Further functional analysis of these two affected genes showed that when silenced, they also reduced susceptibility to Bgh. Taken together, we postulate that Bln1 is co-opted by Bgh to facilitate transport of disease-related host proteins or effectors, influencing the establishment of Bgh compatibility on its barley host. PMID:26089830
NASA Technical Reports Server (NTRS)
Ghaffari, Farhad
1999-01-01
Unstructured grid Euler computations, performed at supersonic cruise speed, are presented for a High Speed Civil Transport (HSCT) configuration, designated as the Technology Concept Airplane (TCA) within the High Speed Research (HSR) Program. The numerical results are obtained for the complete TCA cruise configuration which includes the wing, fuselage, empennage, diverters, and flow through nacelles at M (sub infinity) = 2.4 for a range of angles-of-attack and sideslip. Although all the present computations are performed for the complete TCA configuration, appropriate assumptions derived from the fundamental supersonic aerodynamic principles have been made to extract aerodynamic predictions to complement the experimental data obtained from a 1.675%-scaled truncated (aft fuselage/empennage components removed) TCA model. The validity of the computational results, derived from the latter assumptions, are thoroughly addressed and discussed in detail. The computed surface and off-surface flow characteristics are analyzed and the pressure coefficient contours on the wing lower surface are shown to correlate reasonably well with the available pressure sensitive paint results, particularly, for the complex flow structures around the nacelles. The predicted longitudinal and lateral/directional performance characteristics for the truncated TCA configuration are shown to correlate very well with the corresponding wind-tunnel data across the examined range of angles-of-attack and sideslip. The complementary computational results for the longitudinal and lateral/directional performance characteristics for the complete TCA configuration are also presented along with the aerodynamic effects due to empennage components. Results are also presented to assess the computational method performance, solution sensitivity to grid refinement, and solution convergence characteristics.
Predicting Factors of Zone 4 Attack in Volleyball.
Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert
2017-06-01
This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.
Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard
2017-01-01
Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ortlund, E.; Parker, C. L.; Schreck, A. F.
2002-01-01
C8gamma is a 22-kDa subunit of human C8, which is one of five components of the cytolytic membrane attack complex of complement (MAC). C8gamma is disulfide-linked to a C8alpha subunit that is noncovalently associated with a C8beta chain. In the present study, the three-dimensional structure of recombinant C8gamma was determined by X-ray diffraction to 1.2 A resolution. The structure displays a typical lipocalin fold forming a calyx with a distinct binding pocket that is indicative of a ligand-binding function for C8gamma. When compared to other lipocalins, the overall structure is most similar to neutrophil gelatinase associated lipocalin (NGAL), a proteinmore » released from granules of activated neutrophils. Notable differences include a much deeper binding pocket in C8gamma as well as variation in the identity and position of residues lining the pocket. In C8gamma, these residues allow ligand access to a large hydrophobic cavity at the base of the calyx, whereas corresponding residues in NGAL restrict access. This suggests the natural ligands for C8gamma and NGAL are significantly different in size. Cys40 in C8gamma, which forms the disulfide bond to C8alpha, is located in a partially disordered loop (loop 1, residues 38-52) near the opening of the calyx. Access to the calyx may be regulated by movement of this loop in response to conformational changes in C8alpha during MAC formation.« less
NASA Astrophysics Data System (ADS)
Franc, Vojtech; Zhu, Jing; Heck, Albert J. R.
2018-03-01
The human complement hetero-trimeric C8αβγ (C8) protein assembly ( 150 kDa) is an important component of the membrane attack complex (MAC). C8 initiates membrane penetration and coordinates MAC pore formation. Here, we charted in detail the structural micro-heterogeneity within C8, purified from human plasma, combining high-resolution native mass spectrometry and (glyco)peptide-centric proteomics. The intact C8 proteoform profile revealed at least 20 co-occurring MS signals. Additionally, we employed ion exchange chromatography to separate purified C8 into four distinct fractions. Their native MS analysis revealed even more detailed structural micro-heterogeneity on C8. Subsequent peptide-centric analysis, by proteolytic digestion of C8 and LC-MS/MS, provided site-specific quantitative profiles of different types of C8 glycosylation. Combining all this data provides a detailed specification of co-occurring C8 proteoforms, including experimental evidence on N-glycosylation, C-mannosylation, and O-glycosylation. In addition to the known N-glycosylation sites, two more N-glycosylation sites were detected on C8. Additionally, we elucidated the stoichiometry of all C-mannosylation sites in all the thrombospondin-like (TSP) domains of C8α and C8β. Lastly, our data contain the first experimental evidence of O-linked glycans located on C8γ. Albeit low abundant, these O-glycans are the first PTMs ever detected on this subunit. By placing the observed PTMs in structural models of free C8 and C8 embedded in the MAC, it may be speculated that some of the newly identified modifications may play a role in the MAC formation. [Figure not available: see fulltext.
Rastaldi, M P; Candiano, G; Musante, L; Bruschi, M; Armelloni, S; Rimoldi, L; Tardanico, R; Sanna-Cherchi, S; Cherchi, S Sanna; Ferrario, F; Montinaro, V; Haupt, R; Parodi, S; Carnevali, M L; Allegri, L; Camussi, G; Gesualdo, L; Scolari, F; Ghiggeri, G M
2006-08-01
Mechanisms for human membranous glomerulonephritis (MGN) remain elusive. Most up-to-date concepts still rely on the rat model of Passive Heymann Nephritis that derives from an autoimmune response to glomerular megalin, with complement activation and membrane attack complex assembly. Clusterin has been reported as a megalin ligand in immunodeposits, although its role has not been clarified. We studied renal biopsies of 60 MGN patients by immunohistochemistry utilizing antibodies against clusterin, C5b-9, and phosphorylated-protien kinase C (PKC) isoforms (pPKC). In vitro experiments were performed to investigate the role of clusterin during podocyte damage by MGN serum and define clusterin binding to human podocytes, where megalin is known to be absent. Clusterin, C5b-9, and pPKC-alpha/beta showed highly variable glomerular staining, where high clusterin profiles were inversely correlated to C5b-9 and PKC-alpha/beta expression (P=0.029), and co-localized with the low-density lipoprotein receptor (LDL-R). Glomerular clusterin emerged as the single factor influencing proteinuria at multivariate analysis and was associated with a reduction of proteinuria after a follow-up of 1.5 years (-88.1%, P=0.027). Incubation of podocytes with MGN sera determined strong upregulation of pPKC-alpha/beta that was reverted by pre-incubation with clusterin, serum de-complementation, or protein-A treatment. Preliminary in vitro experiments showed podocyte binding of biotinilated clusterin, co-localization with LDL-R and specific binding inhibition with anti-LDL-R antibodies and with specific ligands. These data suggest a central role for glomerular clusterin in MGN as a modulator of inflammation that potentially influences the clinical outcome. Binding of clusterin to the LDL-R might offer an interpretative key for the pathogenesis of MGN in humans.
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
The Many Facets of Lipooligosaccharide as a Virulence Factor for Histophilus somni.
Inzana, Thomas J
2016-01-01
The lipooligosaccharide (LOS) of Histophilus somni is a multifaceted molecule that provides critical protection to the bacterium against host defenses, may act as an adhesin, and like similar molecules of gram-negative bacteria, is an endotoxin that signals through toll-like receptor 4 and NF-κB to cause inflammation. The lipid A component is responsible for the endotoxic and apoptotic activity of the LOS. The H. somni LOS lacks O-side chains typically characteristic of gram-negative bacteria that have lipopolysaccharide, but has a complex, microheterogeneous outer core. The LOS of disease isolates is capable of undergoing structural and antigenic phase variation of its outer core due to slip-strand mispairing of glycosyltransferase genes that contain repetitive sequences of DNA base pairs. Such variation enables the bacteria to evade bactericidal antibodies made to oligosaccharide antigens. In addition, the LOS can be decorated with phase-variable phosphorylcholine (ChoP), which binds to platelet-activating factor receptor on host cells, thereby aiding in colonization of the upper respiratory tract. However, ChoP is likely not expressed when the bacteria are in systemic sites because ChoP also binds to C-reactive protein, resulting in activation of host complement and promoting bactericidal activity. The structure of some LOS outer core chains is identical to oligosaccharides on host glycosphingolipids of red blood cells, other cells, and merconium (lacto-N-neotetraose, lacto-N-biose, N-acetyllactosamine, etc.). Furthermore, terminal galactose residues on LOS and elsewhere are decorated with sialic acid, which blocks antibody binding, activation of complement, phagocytosis, and intracellular killing. Therefore, antigenic mimicry of host antigens is an important defense mechanism provided by the oligosaccharide component of the LOS to avoid innate and adaptive host defense mechanisms. However, some strains of H. somni isolated from the bovine genital tract, particularly the normal bovine prepuce, are incapable of LOS phase variation, sialylation of the LOS, and expression of ChoP. At least 1 such strain has been shown to be avirulent, underscoring the importance of the LOS as a virulence factor, although this strain is deficient in other factors as well. The structure and arrangement of the inner core glycoses (heptose and 3-deoxy-D-manno-2-octulosnic acid) is remarkably similar to the inner core oligosaccharide on some strains of Neisseria spp., and mutants that contain a truncated LOS oligosaccharide are considerably more serum-sensitive than the parent strain. Therefore, the LOS is a critical component that enables H. somni to resist host defenses and cause disease.
... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Application of Cellular Automata to Detection of Malicious Network Packets
ERIC Educational Resources Information Center
Brown, Robert L.
2014-01-01
A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…
Cooperating attackers in neural cryptography.
Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang
2004-06-01
A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.
Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks
Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David
2014-01-01
Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753
DBPs in drinking water can be controlled by the type of treatment and by knowing and controlling major sources of DBP toxicant precursors and toxicants that "evade" treatment processes. Efforts are being directed at one category at a time. The initial precursor categories to be c...
James Franklin and Freedom of the Press in Massachusetts and Rhode Island, 1717-1735.
ERIC Educational Resources Information Center
Smith, Jeffery A.
The career of James Franklin, Benjamin Franklin's older brother, provides a case study in the use of polemics for a free press. A printer who actively courted controversy, Franklin found it necessary to use an unusual variety of strategies and justifications to evade or overcome potential legal, religious, and economic restraints. He demonstrated…
Barbara J. Bentz; E. Matthew Hansen
2017-01-01
Dormancy strategies, including diapause and quiescence, enable insects to evade adverse conditions and ensure seasonally appropriate life stages. A mechanistic understanding of a speciesâ dormancy is necessary to predict population response in a changing climate. Climate change is influencing distribution patterns and population success of many species, including...
USDA-ARS?s Scientific Manuscript database
The 35 kDa major membrane protein (MMP) of Mycobacterium avium subsp. paratuberculosis (Map) is implicated in the pathogenesis of paratuberculosis (Ptb) in cattle. Understanding the immune response to MMP could reveal how Map evades immune elimination and provide information needed for developing a ...
Environmental Statement for Proposed Continental Operations Range.
1974-12-17
out territories, recognize young, detect and locate prey , and evade predators . These functions could be critically affected, even if the animals appear... Sparrow 254. CaZamoapiza meZanocorye Lark Bunting 266. Spizella atrogularis evura 255. Paaaerculue 8andwichensia nevadensis* Black-chinned Sparrow ...and Evaluation Systems Program Office By ............. .....------------- Kirtland Air Force Base, New Mexico Distribution I Availability Codes I
8 CFR 1101.2 - Presumption of lawful admission; entry under erroneous name or other errors.
Code of Federal Regulations, 2014 CFR
2014-01-01
... the purpose of concealing his identity when obtaining a passport or visa, or for the purpose of using the passport or visa of another person or otherwise evading any provision of the immigration laws, and... time prior to making application for a passport or visa to have permitted the issuing authority or...
8 CFR 1101.2 - Presumption of lawful admission; entry under erroneous name or other errors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the purpose of concealing his identity when obtaining a passport or visa, or for the purpose of using the passport or visa of another person or otherwise evading any provision of the immigration laws, and... time prior to making application for a passport or visa to have permitted the issuing authority or...
8 CFR 1101.2 - Presumption of lawful admission; entry under erroneous name or other errors.
Code of Federal Regulations, 2012 CFR
2012-01-01
... the purpose of concealing his identity when obtaining a passport or visa, or for the purpose of using the passport or visa of another person or otherwise evading any provision of the immigration laws, and... time prior to making application for a passport or visa to have permitted the issuing authority or...
8 CFR 1101.2 - Presumption of lawful admission; entry under erroneous name or other errors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... the purpose of concealing his identity when obtaining a passport or visa, or for the purpose of using the passport or visa of another person or otherwise evading any provision of the immigration laws, and... time prior to making application for a passport or visa to have permitted the issuing authority or...
8 CFR 1101.2 - Presumption of lawful admission; entry under erroneous name or other errors.
Code of Federal Regulations, 2013 CFR
2013-01-01
... the purpose of concealing his identity when obtaining a passport or visa, or for the purpose of using the passport or visa of another person or otherwise evading any provision of the immigration laws, and... time prior to making application for a passport or visa to have permitted the issuing authority or...
Wildlife of southern forests habitat & management (Chapter 15): Rabbits
James G. Dickson
2003-01-01
Rabbits, or lagomorphs, resemble rodents. But unlike rodents they have relatively large hind legs, large ears, a short fluffy tail, and 2 sets of upper incisors. Like rodents their incisors grow continually. They can either walk or hop, and are fleet and elusive when evading predators. They normally are silent but are capable of several different vocalizations. Rabbits...
Can butterflies evade fire? Pupa location and heat tolerance in fire prone habitats of Florida
USDA-ARS?s Scientific Manuscript database
The imperiled frosted elfin butterfly, Callophrys irus Godart, is restricted to frequently disturbed habitats where its larval host plants, Lupinus perennis L. and Baptisia tinctoria (L.) R. Br. occur. C. irus pupae are noted to reside in both leaf litter and soil, which may allow them to escape dir...
8 CFR 1216.3 - Termination of conditional resident status.
Code of Federal Regulations, 2010 CFR
2010-01-01
... government that an alien entrepreneur who was admitted pursuant to section 203(b)(5) of the Act obtained his... 216(b)(1) or 216A(b)(1) of the Act, whichever is applicable, are true, or that an alien entrepreneur... marriage which was entered into for the purpose of evading the immigration laws or an alien entrepreneur...
Inflammasome activation: how macrophages watch what they eat.
Vance, Russell E
2010-01-21
Underhill and colleagues (Shimada et al., 2010) provide evidence for an intriguing link between the activity of lysozyme in the phagosome and activation of the Nlrp3 inflammasome, a cytosolic regulator of inflammation and cytokine production. The authors show that resistance to lysozyme allows Staphylococcus aureus to evade Nlrp3 activation. 2010 Elsevier Inc. All rights reserved.
Code of Federal Regulations, 2013 CFR
2013-01-01
... President by the Constitution and the laws of the United States of America, including the International... America, hereby find that efforts by foreign persons to engage in activities intended to evade U.S... relates to property and interests in property of any person subject to United States sanctions concerning...
Teaching Youth Rugby: Instructional Strategies and Models that Work
ERIC Educational Resources Information Center
Olsen, Edward B.; Caram, Courtney; Griffin, Mark
2011-01-01
Rookie Rugby is a continuous team invasion game of tag with a ball. It is also inclusive giving every participant an active role regardless of their size, shape, gender, or experience. In essence, all players are quarterbacks who can run, catch, pass, tag, evade, and score. Thus, rugby empowers students to create and react, cooperate and compete,…
U. S. Naval Forces, Vietnam Monthly Historical Summary for June 1968
1968-07-04
eneu" fire in the sane area. This time the Viet Cong achieved devastating results. PBR 750 had pursued and captured an eneM sampan _ _ that had evaded...crossing the Saigon River., but, eaierged vic;.orious with a total of 121 enem dead and 7 captured in thos* twD days of figbting. Four Yarines were
Aiming Airsea Battle: An Operational Concept To Counter China’s Maritime Area Denial Capabilities
2011-06-18
the SS- N-22 Sunburn , is a sea-skimming weapon with a supersonic, evading flight path specifically designed to defeat the air defenses of U.S. Navy... Sunburn .10 The last ten years has also seen a rapid modernization of the indigenously built Chinese submarine force. China has introduced a new
Overview: tympanal organs of Pyraloidea adults (Insecta: Lepidoptera)
USDA-ARS?s Scientific Manuscript database
There are over 16,000 species of pyraloid or snout moths worldwide and many are pests of crops and stored products. The purpose of this video is to use a microscope to provide an in-depth look at the tympanal organs or "ears" that the moths use to evade bat predation. The two families of snout mot...
Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.
ERIC Educational Resources Information Center
Affleck, Glenn; And Others
1987-01-01
Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…
On Patarin's Attack against the lIC Scheme
NASA Astrophysics Data System (ADS)
Ogura, Naoki; Uchiyama, Shigenori
In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.
Supersonic Aerodynamic Characteristics of Proposed Mars '07 Smart Lander Configurations
NASA Technical Reports Server (NTRS)
Murphy, Kelly J.; Horvath, Thomas J.; Erickson, Gary E.; Green, Joseph M.
2002-01-01
Supersonic aerodynamic data were obtained for proposed Mars '07 Smart Lander configurations in NASA Langley Research Center's Unitary Plan Wind Tunnel. The primary objective of this test program was to assess the supersonic aerodynamic characteristics of the baseline Smart Lander configuration with and without fixed shelf/tab control surfaces. Data were obtained over a Mach number range of 2.3 to 4.5, at a free stream Reynolds Number of 1 x 10(exp 6) based on body diameter. All configurations were run at angles of attack from -5 to 20 degrees and angles of sideslip of -5 to 5 degrees. These results were complemented with computational fluid dynamic (CFD) predictions to enhance the understanding of experimentally observed aerodynamic trends. Inviscid and viscous full model CFD solutions compared well with experimental results for the baseline and 3 shelf/tab configurations. Over the range tested, Mach number effects were shown to be small on vehicle aerodynamic characteristics. Based on the results from 3 different shelf/tab configurations, a fixed control surface appears to be a feasible concept for meeting aerodynamic performance metrics necessary to satisfy mission requirements.
Active flow control for a NACA-0012 Profile: Part II
NASA Astrophysics Data System (ADS)
Oualli, H.; Makadem, M.; Ouchene, H.; Ferfouri, A.; Bouabdallah, A.; Gad-El-Hak, M.
2016-11-01
Active flow control is applied to a NACA-0012 profile. The experiments are conducted in a wind tunnel. Using a high-resolution visible-light camera and tomography, flow visualizations are carried out. LES finite-volume 3D code is used to complement the physical experiments. The symmetric wing is clipped into two parts, and those parts extend and retract along the chord according to the same sinusoidal law we optimized last year for the same profile but clipped at an angle of 60 deg, instead of the original 90 deg. The Reynolds number range is extended to 500,000, thus covering the flying regimes of micro-UAVs, UAVs, as well as small aircraft. When the nascent cavity is open and the attack angle is 30 deg, the drag coefficient is increased by 1,300%, as compared to the uncontrolled case. However, when the cavity is covered and Re <=105 , a relatively small frequency, f <= 30 Hz, is required for the drag coefficient to drop to negative values. At the maximum Reynolds number, thrust is generated but only at much higher frequencies, 12 <= f <= 16 kHz.
An Inviscid Computational Study of the Space Shuttle Orbiter and Several Damaged Configurations
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.; Merski, N. Ronald (Technical Monitor)
2004-01-01
Inviscid aerodynamic characteristics of the Space Shuttle Orbiter were computed in support of the Columbia Accident Investigation. The unstructured grid software FELISA was used and computations were done using freestream conditions corresponding to those in the NASA Langley 20-Inch Mach 6 CF4 tunnel test section. The angle of attack was held constant at 40 degrees. The baseline (undamaged) configuration and a large number of damaged configurations of the Orbiter were studied. Most of the computations were done on a half model. However, one set of computations was done using the full-model to study the effect of sideslip. The differences in the aerodynamic coefficients for the damaged and the baseline configurations were computed. Simultaneously with the computation reported here, tests were being done on a scale model of the Orbiter in the 20-Inch Mach 6 CF4 tunnel to measure the deltas . The present computations complemented the CF4 tunnel test, and provided aerodynamic coefficients of the Orbiter as well as its components. Further, they also provided details of the flow field.
Necroinflammation in Kidney Disease.
Mulay, Shrikant R; Linkermann, Andreas; Anders, Hans-Joachim
2016-01-01
The bidirectional causality between kidney injury and inflammation remains an area of unexpected discoveries. The last decade unraveled the molecular mechanisms of sterile inflammation, which established danger signaling via pattern recognition receptors as a new concept of kidney injury-related inflammation. In contrast, renal cell necrosis remained considered a passive process executed either by the complement-related membrane attack complex, exotoxins, or cytotoxic T cells. Accumulating data now suggest that renal cell necrosis is a genetically determined and regulated process involving specific outside-in signaling pathways. These findings support a unifying theory in which kidney injury and inflammation are reciprocally enhanced in an autoamplification loop, referred to here as necroinflammation. This integrated concept is of potential clinical importance because it offers numerous innovative molecular targets for limiting kidney injury by blocking cell death, inflammation, or both. Here, the contribution of necroinflammation to AKI is discussed in thrombotic microangiopathies, necrotizing and crescentic GN, acute tubular necrosis, and infective pyelonephritis or sepsis. Potential new avenues are further discussed for abrogating necroinflammation-related kidney injury, and questions and strategies are listed for further exploration in this evolving field. Copyright © 2016 by the American Society of Nephrology.
Impact of diet and exercise on lipid management in the modern era.
Franklin, Barry A; Durstine, J Larry; Roberts, Christian K; Barnard, R James
2014-06-01
Unfortunately, many patients as well as the medical community, continue to rely on coronary revascularization procedures and cardioprotective medications as a first-line strategy to stabilize or favorably modify established risk factors and the course of coronary artery disease. However, these therapies do not address the root of the problem, that is, the most proximal risk factors for heart disease, including unhealthy dietary practices, physical inactivity, and cigarette smoking. We argue that more emphasis must be placed on novel approaches to embrace current primary and secondary prevention guidelines, which requires attacking conventional risk factors and their underlying environmental causes. The impact of lifestyle on the risk of cardiovascular disease has been well established in clinical trials, but these results are often overlooked and underemphasized. Considerable data also strongly support the role of lifestyle intervention to improve glucose and insulin homeostasis, as well as physical inactivity and/or low aerobic fitness. Accordingly, intensive diet and exercise interventions can be highly effective in facilitating coronary risk reduction, complementing and enhancing medications, and in some instances, even outperforming drug therapy. Copyright © 2014 Elsevier Ltd. All rights reserved.
Mushtaq, Naseem; Redpath, Maria B; Luzio, J Paul; Taylor, Peter W
2004-05-01
Escherichia coli is a common cause of meningitis and sepsis in the newborn infant, and the large majority of isolates from these infections produce a polysialic acid (PSA) capsular polysaccharide, the K1 antigen, that protects the bacterial cell from immune attack. We determined whether a capsule-depolymerizing enzyme, by removing this protective barrier, could alter the outcome of systemic infection in an animal model. Bacteriophage-derived endosialidase E (endoE) selectively degrades the PSA capsule on the surface of E. coli K1 strains. Intraperitoneal administration of small quantities of recombinant endoE (20 micro g) to 3-day-old rats, colonized with a virulent strain of K1, prevented bacteremia and death from systemic infection. The enzyme had no effect on the viability of E. coli strains but sensitized strains expressing PSA to killing by the complement system. This study demonstrates the potential therapeutic efficacy of agents that cure infections by modification of the bacterial phenotype rather than by killing or inhibition of growth of the pathogen.
Persistent effects of chlorine inhalation on respiratory health
Hoyle, Gary W.; Svendsen, Erik R.
2016-01-01
Chlorine gas is a toxic respiratory irritant that is considered a chemical threat agent because of the potential for release in industrial accidents or terrorist attacks. Chlorine inhalation damages the respiratory tract, including the airways and distal lung, and can result in acute lung injury. Some individuals exposed to chlorine experience a full recovery from acute injury, whereas others develop persistent adverse effects, such as respiratory symptoms, inflammation, and lung-function decrements. In animal models, chlorine can produce persistent inflammation, remodeling, and obstruction in large or small airways, depending on species. Airways with pseudostratified epithelium are repaired efficiently, with surviving basal epithelial cells serving as progenitor cells that repopulate the complement of differentiated cell types. Distal airways lacking basal cells are repaired less efficiently, leading to chronic inflammation and fibrosis at these sites. Persistent chlorine-induced airway disease in humans is treated with asthma medication to relieve symptoms. However, such treatment does not ameliorate the underlying disease pathogenesis, so treatments that are more effective at preventing initial development of airway disease after irritant gas exposure and at reversing established disease are needed. PMID:27385061
Protein-linked glycans in periodontal bacteria: prevalence and role at the immune interface.
Settem, Rajendra P; Honma, Kiyonobu; Stafford, Graham P; Sharma, Ashu
2013-10-17
Protein modification with complex glycans is increasingly being recognized in many pathogenic and non-pathogenic bacteria, and is now thought to be central to the successful life-style of those species in their respective hosts. This review aims to convey current knowledge on the extent of protein glycosylation in periodontal pathogenic bacteria and its role in the modulation of the host immune responses. The available data show that surface glycans of periodontal bacteria orchestrate dendritic cell cytokine responses to drive T cell immunity in ways that facilitate bacterial persistence in the host and induce periodontal inflammation. In addition, surface glycans may help certain periodontal bacteria protect against serum complement attack or help them escape immune detection through glycomimicry. In this review we will focus mainly on the generalized surface-layer protein glycosylation system of the periodontal pathogen Tannerella forsythia in shaping innate and adaptive host immunity in the context of periodontal disease. In addition, we will also review the current state of knowledge of surface protein glycosylation and its potential for immune modulation in other periodontal pathogens.
MBL-associated serine proteases (MASPs) and infectious diseases.
Beltrame, Marcia H; Boldt, Angelica B W; Catarino, Sandra J; Mendes, Hellen C; Boschmann, Stefanie E; Goeldner, Isabela; Messias-Reason, Iara
2015-09-01
The lectin pathway of the complement system has a pivotal role in the defense against infectious organisms. After binding of mannan-binding lectin (MBL), ficolins or collectin 11 to carbohydrates or acetylated residues on pathogen surfaces, dimers of MBL-associated serine proteases 1 and 2 (MASP-1 and MASP-2) activate a proteolytic cascade, which culminates in the formation of the membrane attack complex and pathogen lysis. Alternative splicing of the pre-mRNA encoding MASP-1 results in two other products, MASP-3 and MAp44, which regulate activation of the cascade. A similar mechanism allows the gene encoding MASP-2 to produce the truncated MAp19 protein. Polymorphisms in MASP1 and MASP2 genes are associated with protein serum levels and functional activity. Since the first report of a MASP deficiency in 2003, deficiencies in lectin pathway proteins have been associated with recurrent infections and several polymorphisms were associated with the susceptibility or protection to infectious diseases. In this review, we summarize the findings on the role of MASP polymorphisms and serum levels in bacterial, viral and protozoan infectious diseases. Copyright © 2015 Elsevier Ltd. All rights reserved.
Machine Learning Methods for Attack Detection in the Smart Grid.
Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent
2016-08-01
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.
Split-second escape decisions in blue tits (Parus caeruleus)
NASA Astrophysics Data System (ADS)
Lind, Johan; Kaby, Ulrika; Jakobsson, Sven
2002-07-01
Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.
Hybrid attacks on model-based social recommender systems
NASA Astrophysics Data System (ADS)
Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao
2017-10-01
With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.
Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
NASA Astrophysics Data System (ADS)
Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.
2009-12-01
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).
Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
NASA Astrophysics Data System (ADS)
Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam
A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.
Attacks on public telephone networks: technologies and challenges
NASA Astrophysics Data System (ADS)
Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet
2003-09-01
Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.
Novel mechanism of network protection against the new generation of cyber attacks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit
2012-06-01
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
NASA Astrophysics Data System (ADS)
Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu
Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.
NASA Astrophysics Data System (ADS)
Liu, Penghui; Liu, Jing
2017-08-01
Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.
Genetics Home Reference: Fanconi anemia
... D1 Genetic Testing Registry: Fanconi anemia, complementation group D2 Genetic Testing Registry: Fanconi anemia, complementation group E ... ANEMIA, COMPLEMENTATION GROUP D1 FANCONI ANEMIA, COMPLEMENTATION GROUP D2 FANCONI ANEMIA, COMPLEMENTATION GROUP E FANCONI ANEMIA, COMPLEMENTATION ...
Dengue Non-coding RNA: TRIMmed for Transmission.
Göertz, Giel P; Pijlman, Gorben P
2015-08-12
Dengue virus RNA is trimmed by the 5'→3' exoribonuclease XRN1 to produce an abundant, non-coding subgenomic flavivirus RNA (sfRNA) in infected cells. In a recent paper in Science, Manokaran et al. (2015) report that sfRNA binds TRIM25 to evade innate immune sensing of viral RNA by RIG-I. Copyright © 2015 Elsevier Inc. All rights reserved.
Avoiding Accountability: How Charter Operators Evade Ohio's Automatic Closure Law. K-12 Education
ERIC Educational Resources Information Center
DePaoli, Jennifer; van Lier, Piet
2013-01-01
Ohio's charter-closure law is touted as one of the toughest in the nation because it requires the automatic closure of charter schools that consistently fail to meet academic standards. Ohio's charter-closure law, which became effective in 2008 and was revised in 2011, calls for automatic closure of schools rated in Academic Emergency for at least…
USDA-ARS?s Scientific Manuscript database
Aggregatibacter actinomycetemcomitans, a periodontal pathogen, synthesizes leukotoxin (LtxA), a protein that helps the bacterium evade the host immune response. Transcription of the ltxA operon is induced during anaerobic growth. The cAMP receptor protein (CRP) indirectly increases ltxA expression...
12 CFR 225.173 - How are investments in private equity funds treated under this subpart?
Code of Federal Regulations, 2011 CFR
2011-01-01
... inconsistent with the authority granted under section 4(k)(4)(H) of the Bank Holding Company Act (12 U.S.C. 1843(k)(4)(H)) or evading the limitations governing merchant banking investments contained in this... 12 Banks and Banking 3 2011-01-01 2011-01-01 false How are investments in private equity funds...
26 CFR 301.6501(c)-1 - Exceptions to general period of limitations on assessment and collection.
Code of Federal Regulations, 2012 CFR
2012-04-01
... assessment and collection. 301.6501(c)-1 Section 301.6501(c)-1 Internal Revenue INTERNAL REVENUE SERVICE... Limitations on Assessment and Collection § 301.6501(c)-1 Exceptions to general period of limitations on assessment and collection. (a) False return. In the case of a false or fraudulent return with intent to evade...
26 CFR 301.6501(c)-1 - Exceptions to general period of limitations on assessment and collection.
Code of Federal Regulations, 2013 CFR
2013-04-01
... assessment and collection. 301.6501(c)-1 Section 301.6501(c)-1 Internal Revenue INTERNAL REVENUE SERVICE... Limitations on Assessment and Collection § 301.6501(c)-1 Exceptions to general period of limitations on assessment and collection. (a) False return. In the case of a false or fraudulent return with intent to evade...
26 CFR 301.6501(c)-1 - Exceptions to general period of limitations on assessment and collection.
Code of Federal Regulations, 2014 CFR
2014-04-01
... assessment and collection. 301.6501(c)-1 Section 301.6501(c)-1 Internal Revenue INTERNAL REVENUE SERVICE... Limitations on Assessment and Collection § 301.6501(c)-1 Exceptions to general period of limitations on assessment and collection. (a) False return. In the case of a false or fraudulent return with intent to evade...
Scientists from CCR have generated a comprehensive structural map of Kaposi sarcoma-associated herpesvirus polyadenylated nuclear (PAN) RNA, a long non-coding RNA that helps the virus evade detection by its host’s immune system. The findings open new oppportunites to study the life cycle of this cancer-causing virus. Learn more...
Identification of variant-specific surface proteins in Giardia muris trophozoites.
Ropolo, Andrea S; Saura, Alicia; Carranza, Pedro G; Lujan, Hugo D
2005-08-01
Giardia lamblia undergoes antigenic variation, a process that might allow the parasite to evade the host's immune response and adapt to different environments. Here we show that Giardia muris, a related species that naturally infects rodents, possesses multiple variant-specific surface proteins (VSPs) and expresses VSPs on its surface, suggesting that it undergoes antigenic variation similar to that of G. lamblia.
Code of Federal Regulations, 2010 CFR
2010-04-01
... sustained large net operating losses in the operation of business X and which has filed separate returns for... the purpose to evade or avoid Federal income tax exceeds in importance any other purpose, it is the... evasion or avoidance of Federal income tax: (1) A corporation or other business enterprise (or the...
USDA-ARS?s Scientific Manuscript database
Two opposing evolutionary constraints exert pressure on pathogens: one to diversify virulence factors in order to evade host defenses, and the other to retain virulence factors critical for maintaining a compatible interaction. To better understand how the diversified arsenals of fungal genes promot...
Air Force Handbook. 109th Congress
2009-01-01
FY06 Combat Survivor Evader Locator (CSEL) Acquisition Status Capabilities/Profile Functions /Performance Parameters 38 • Air Force’s primary source for...Broadcast Service (GBS) Capabilities/Profile Acquisition Status Functions /Performance Parameters • Purchase Requirements (Phase 2): • 3 primary ...Operations (AF CONOPS) that support the CSAF and joint vision of combat operations. • AF CONOPS describe key Air Force mission and/or functional areas
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... accounts and undisclosed foreign entities to avoid or evade tax into compliance with United States tax laws... information collections, as required by the Paperwork Reduction Act of 1995, Public Law 104-13 (44 U.S.C. 3506... offering people with undisclosed income from offshore accounts an opportunity to get current with their tax...
High levels of potassium inside tumors suppress immune activity | Center for Cancer Research
Nicholas P. Restifo, a senior investigator in CCR’s Surgery Branch and his team have discovered that an abundance of potassium inside tumors dampens immune responses, helping the tumors evade the body’s defenses. In animal experiments, genetically equipping immune cells rid themselves of potassium made them more effective at fighting cancer. The finding, published September
NASA Astrophysics Data System (ADS)
Momeni, D.; Moraes, P. H. R. S.; Gholizade, H.; Myrzakulov, R.
Modified gravity models have been constantly proposed with the purpose of evading some standard gravity shortcomings. Recently proposed by Chamseddine and Mukhanov, the Mimetic Gravity arises as an optimistic alternative. Our purpose in this work is to derive Tolman-Oppenheimer-Volkoff equations and solutions for such a gravity theory. We solve them numerically for quark star and neutron star cases. The results are carefully discussed.
Spottiswoode, Claire N; Stevens, Martin
2011-12-07
Arms races between avian brood parasites and their hosts often result in parasitic mimicry of host eggs, to evade rejection. Once egg mimicry has evolved, host defences could escalate in two ways: (i) hosts could improve their level of egg discrimination; and (ii) negative frequency-dependent selection could generate increased variation in egg appearance (polymorphism) among individuals. Proficiency in one defence might reduce selection on the other, while a combination of the two should enable successful rejection of parasitic eggs. We compared three highly variable host species of the Afrotropical cuckoo finch Anomalospiza imberbis, using egg rejection experiments and modelling of avian colour and pattern vision. We show that each differed in their level of polymorphism, in the visual cues they used to reject foreign eggs, and in their degree of discrimination. The most polymorphic host had the crudest discrimination, whereas the least polymorphic was most discriminating. The third species, not currently parasitized, was intermediate for both defences. A model simulating parasitic laying and host rejection behaviour based on the field experiments showed that the two host strategies result in approximately the same fitness advantage to hosts. Thus, neither strategy is superior, but rather they reflect alternative potential evolutionary trajectories.
Generation of a Kupffer Cell-evading Adenovirus for Systemic and Liver-directed Gene Transfer
Khare, Reeti; May, Shannon M; Vetrini, Francesco; Weaver, Eric A; Palmer, Donna; Rosewell, Amanda; Grove, Nathan; Ng, Philip; Barry, Michael A
2011-01-01
As much as 90% of an intravenously (i.v.) injected dose of adenovirus serotype 5 (Ad5) is absorbed and destroyed by liver Kupffer cells. Viruses that escape these cells can then transduce hepatocytes after binding factor X (FX). Given that interactions with FX and Kupffer cells are thought to occur on the Ad5 hexon protein, we replaced its exposed hypervariable regions (HVR) with those from Ad6. When tested in vivo in BALB/c mice and in hamsters, the Ad5/6 chimera mediated >10 times higher transduction in the liver. This effect was not due to changes in FX binding. Rather, Ad5/6 appeared to escape Kupffer cell uptake as evidenced by producing no Kupffer cell death in vivo, not requiring predosing in vivo, and being phagocytosed less efficiently by macrophages in vitro compared to Ad5. When tested as a helper-dependent adenovirus (Ad) vector, Ad5/6 mediated higher luciferase and factor IX transgene expression than either helper-dependent adenoviral 5 (HD-Ad5) or HD-Ad6 vectors. These data suggest that the Ad5/6 hexon-chimera evades Kupffer cells and may have utility for systemic and liver-directed therapies. PMID:21505422
Generation of a Kupffer cell-evading adenovirus for systemic and liver-directed gene transfer.
Khare, Reeti; May, Shannon M; Vetrini, Francesco; Weaver, Eric A; Palmer, Donna; Rosewell, Amanda; Grove, Nathan; Ng, Philip; Barry, Michael A
2011-07-01
As much as 90% of an intravenously (i.v.) injected dose of adenovirus serotype 5 (Ad5) is absorbed and destroyed by liver Kupffer cells. Viruses that escape these cells can then transduce hepatocytes after binding factor X (FX). Given that interactions with FX and Kupffer cells are thought to occur on the Ad5 hexon protein, we replaced its exposed hypervariable regions (HVR) with those from Ad6. When tested in vivo in BALB/c mice and in hamsters, the Ad5/6 chimera mediated >10 times higher transduction in the liver. This effect was not due to changes in FX binding. Rather, Ad5/6 appeared to escape Kupffer cell uptake as evidenced by producing no Kupffer cell death in vivo, not requiring predosing in vivo, and being phagocytosed less efficiently by macrophages in vitro compared to Ad5. When tested as a helper-dependent adenovirus (Ad) vector, Ad5/6 mediated higher luciferase and factor IX transgene expression than either helper-dependent adenoviral 5 (HD-Ad5) or HD-Ad6 vectors. These data suggest that the Ad5/6 hexon-chimera evades Kupffer cells and may have utility for systemic and liver-directed therapies.
Hepatitis C Virus Evasion Mechanisms from Neutralizing Antibodies
Di Lorenzo, Caterina; Angus, Allan G. N.; Patel, Arvind H.
2011-01-01
Hepatitis C virus (HCV) represents a major public health problem, affecting 3% of the world’s population. The majority of infected individuals develop chronic hepatitis, which can progress to cirrhosis and hepatocellular carcinoma. To date, a vaccine is not available and current therapy is limited by resistance, adverse effects and high costs. Although it is very well established that cell-mediated immunity is necessary for viral clearance, the importance of host antibodies in clearing HCV infection is being increasingly recognized. Indeed, recent studies indicate that neutralizing antibodies are induced in the early phase of infection by patients who subsequently clear viral infection. Conversely, patients who do not clear the virus develop high titers of neutralizing antibodies during the chronic stage. Surprisingly, these antibodies are not able to control HCV infection. HCV has therefore developed mechanisms to evade immune elimination, allowing it to persist in the majority of infected individuals. A detailed understanding of the mechanisms by which the virus escapes immune surveillance is therefore necessary if novel preventive and therapeutic treatments have to be designed. This review summarizes the current knowledge of the mechanisms used by HCV to evade host neutralizing antibodies. PMID:22163345
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holmfeldt, Per; Sellin, Mikael E.; Gullberg, Martin, E-mail: Martin.Gullberg@molbiol.umu.se
2010-07-15
Op18/stathmin (Op18) is a microtubule-destabilizing protein that is phosphorylation-inactivated during mitosis and its normal function is to govern tubulin subunit partitioning during interphase. Human tumors frequently overexpress Op18 and a tumor-associated Q18{yields}E mutation has been identified that confers hyperactivity, destabilizes spindle microtubules, and causes mitotic aberrancies, polyploidization, and chromosome loss in K562 leukemia cells. Here we determined whether wild-type and mutant Op18 have the potential to cause chromosomal instability by some means other than interference with spindle assembly, and thereby bypassing the spindle assembly checkpoint. Our approach was based on Op18 derivatives with distinct temporal order of activity during mitosis,more » conferred either by differential phosphorylation inactivation or by anaphase-specific degradation through fusion with the destruction box of cyclin B1. We present evidence that excessive Op18 activity generates chromosomal instability through interference occurring subsequent to the metaphase-to-anaphase transition, which reduces the fidelity of chromosome segregation to spindle poles during anaphase. Similar to uncorrected merotelic attachment, this mechanism evades detection by the spindle assembly checkpoint and thus provides an additional route to chromosomal instability.« less
Parasitic Cape honeybee workers, Apis mellifera capensis, evade policing
NASA Astrophysics Data System (ADS)
Martin, Stephen J.; Beekman, Madeleine; Wossler, Theresa C.; Ratnieks, Francis L. W.
2002-01-01
Relocation of the Cape honeybee, Apis mellifera capensis, by bee-keepers from southern to northern South Africa in 1990 has caused widespread death of managed African honeybee, A. m. scutellata, colonies. Apis mellifera capensis worker bees are able to lay diploid, female eggs without mating by means of automictic thelytoky (meiosis followed by fusion of two meiotic products to restore egg diploidy), whereas workers of other honeybee subspecies are able to lay only haploid, male eggs. The A. m. capensis workers, which are parasitizing and killing A. m. scutellata colonies in northern South Africa, are the asexual offspring of a single, original worker in which the small amount of genetic variation observed is due to crossing over during meiosis (P. Kryger, personal communication). Here we elucidate two principal mechanisms underlying this parasitism. Parasitic A. m. capensis workers activate their ovaries in host colonies that have a queen present (queenright colonies), and they lay eggs that evade being killed by other workers (worker policing)-the normal fate of worker-laid eggs in colonies with a queen. This unique parasitism by workers is an instance in which a society is unable to control the selfish actions of its members.
Mocellin, Simone; Nitti, Donato
2008-05-01
Despite the evidence that immune effectors can play a significant role in controlling tumor growth under natural conditions or in response to therapeutic manipulation, it is clear that malignant cells evade immune surveillance in most cases. Considering that anticancer vaccination has reached a plateau of results and currently no vaccination regimen is indicated as a standard anticancer therapy, the dissection of the molecular events underlying tumor immune escape is the necessary condition to make anticancer vaccines a therapeutic weapon effective enough to be implemented in the routine clinical setting. Recent years have witnessed significant advances in our understanding of the molecular mechanisms underlying tumor immune escape. These mechanistic insights are fostering the development of rationally designed therapeutics aimed at reverting the immunosuppressive circuits that undermine an effective antitumor immune response. In this review, the best characterized mechanisms that allow cancer cells to evade immune surveillance are overviewed and the most debated controversies constellating this complex field are highlighted. In addition, the latest therapeutic strategies devised to overcome tumor immune escape are described, with special regard to those entering clinical phase investigation. Copyright (c) 2007 Wiley-Periodicals, Inc.
GC-MS-Based Metabolome and Metabolite Regulation in Serum-Resistant Streptococcus agalactiae.
Wang, Zhe; Li, Min-Yi; Peng, Bo; Cheng, Zhi-Xue; Li, Hui; Peng, Xuan-Xian
2016-07-01
Streptococcus agalactiae causes severe systemic infections in human and fish. In the present study, we established a pathogen-plasma interaction model by which we explored how S. agalactiae evaded serum-mediated killing. We found that S. agalactiae grew faster in the presence of yellow grouper plasma than in the absence of the plasma, indicating S. agalactiae evolved a way of evading the fish immune system. To determine the events underlying this phenotype, we applied GC-MS-based metabolomics approaches to identify differential metabolomes between S. agalactiae cultured with and without yellow grouper plasma. Through bioinformatics analysis, decreased malic acid and increased adenosine were identified as the most crucial metabolites that distinguish the two groups. Meanwhile, they presented with decreased TCA cycle and elevated purine metabolism, respectively. Finally, exogenous malic acid and adenosine were used to reprogram the plasma-resistant metabolome, leading to elevated and decreased susceptibility to the plasma, respectively. Therefore, our findings reveal for the first time that S. agalactiae utilizes a metabolic trick to respond to plasma killing as a result of serum resistance, which may be reverted or enhanced by exogenous malic acid and adenosine, respectively, suggesting that the metabolic trick can be regulated by metabolites.
Pair Production Constraints on Superluminal Neutrinos Revisited
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brodsky, Stanley J.; /SLAC; Gardner, Susan
2012-02-16
We revisit the pair creation constraint on superluminal neutrinos considered by Cohen and Glashow in order to clarify which types of superluminal models are constrained. We show that a model in which the superluminal neutrino is effectively light-like can evade the Cohen-Glashow constraint. In summary, any model for which the CG pair production process operates is excluded because such timelike neutrinos would not be detected by OPERA or other experiments. However, a superluminal neutrino which is effectively lightlike with fixed p{sup 2} can evade the Cohen-Glashow constraint because of energy-momentum conservation. The coincidence involved in explaining the SN1987A constraint certainlymore » makes such a picture improbable - but it is still intrinsically possible. The lightlike model is appealing in that it does not violate Lorentz symmetry in particle interactions, although one would expect Hughes-Drever tests to turn up a violation eventually. Other evasions of the CG constraints are also possible; perhaps, e.g., the neutrino takes a 'short cut' through extra dimensions or suffers anomalous acceleration in matter. Irrespective of the OPERA result, Lorentz-violating interactions remain possible, and ongoing experimental investigation of such possibilities should continue.« less
NASA Astrophysics Data System (ADS)
Shen, Dan; Jia, Bin; Chen, Genshe; Blasch, Erik; Pham, Khanh
2015-05-01
This paper develops and evaluates a pursuit-evasion (PE) game approach for elusive orbital maneuver and space object tracking. Unlike the PE games in the literature, where the assumption is that either both players have perfect knowledge of the opponents' positions or use primitive sensing models, the proposed PE approach solves the realistic space situation awareness (SSA) problem with imperfect information, where the evaders will exploit the pursuers' sensing and tracking models to confuse their opponents by maneuvering their orbits to increase the uncertainties, which the pursuers perform orbital maneuvers to minimize. In the game setup, each game player P (pursuer) and E (evader) has its own motion equations with a small continuous low-thrust. The magnitude of the low thrust is fixed and the direction can be controlled by the associated game player. The entropic uncertainty is used to generate the cost functions of game players. The Nash or mixed Nash equilibrium is composed of the directional controls of low-thrusts. Numerical simulations are emulated to demonstrate the performance. Simplified perturbations models (SGP4/SDP4) are exploited to calculate the ground truth of the satellite states (position and speed).
Cell-Based Biohybrid Drug Delivery Systems: The Best of the Synthetic and Natural Worlds.
Banskota, Samagya; Yousefpour, Parisa; Chilkoti, Ashutosh
2017-01-01
The goal of drug delivery is to deliver therapeutics to the site of disease while reducing unwanted side effects. In recent years, a diverse variety of synthetic nano and microparticles have been developed as drug delivery systems. The success of these systems for drug delivery lies in their ability to overcome biological barriers such as the blood-brain barrier, to evade immune clearance and avoid nonspecific biodistribution. This Review provides an overview of recent advances in the design of biohybrid drug delivery systems, which combine cells with synthetic systems to overcome some of these biological hurdles. Examples include eukaryotic cells, such as stem cells, red blood cells, immune cells, platelets, and cancer cells that are used to carry drug-loaded synthetic particles. Synthetic particles can also be cloaked with naturally derived cell membranes and thereby evade immune clearance, exhibit prolonged systemic circulation, and target specific tissues by capitalizing on the interaction/homing tendency of certain cells and their membrane components to particular tissues. Different designs of cell-based biohybrid systems and their applications, as well as their promise and limitations, are discussed herein. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Pinger, Jason; Chowdhury, Shanin; Papavasiliou, F Nina
2017-10-10
Trypanosoma brucei is a protozoan parasite that evades its host's adaptive immune response by repeatedly replacing its dense variant surface glycoprotein (VSG) coat from its large genomic VSG repertoire. While the mechanisms regulating VSG gene expression and diversification have been examined extensively, the dynamics of VSG coat replacement at the protein level, and the impact of this process on successful immune evasion, remain unclear. Here we evaluate the rate of VSG replacement at the trypanosome surface following a genetic VSG switch, and show that full coat replacement requires several days to complete. Using in vivo infection assays, we demonstrate that parasites undergoing coat replacement are only vulnerable to clearance via early IgM antibodies for a limited time. Finally, we show that IgM loses its ability to mediate trypanosome clearance at unexpectedly early stages of coat replacement based on a critical density threshold of its cognate VSGs on the parasite surface. Trypanosoma brucei evades the host immune system through replacement of a variant surface glycoprotein (VSG) coat. Here, the authors show that VSG replacement takes several days to complete, and the parasite is vulnerable to the host immune system for a short period of time during the process.
Moisan, Frédéric; Gonzalez, Cleotilde
2017-01-01
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557
Bumiller-Bini, Valéria; Cipolla, Gabriel Adelman; de Almeida, Rodrigo Coutinho; Petzl-Erler, Maria Luiza; Augusto, Danillo Gardenal; Boldt, Angelica Beate Winter
2018-01-01
Skin blisters of pemphigus foliaceus (PF) present concomitant deposition of autoantibodies and components of the complement system (CS), whose gene polymorphisms are associated with susceptibility to different autoimmune diseases. To investigate these in PF, we evaluated 992 single-nucleotide polymorphisms (SNPs) of 44 CS genes, genotyped through microarray hybridization in 229 PF patients and 194 controls. After excluding SNPs with minor allele frequency <1%, out of Hardy–Weinberg equilibrium in controls or in strong linkage disequilibrium (r2 ≥ 0.8), 201 SNPs remained for logistic regression. Polymorphisms of 11 genes were associated with PF. MASP1 encodes a crucial serine protease of the lectin pathway (rs13094773: OR = 0.5, p = 0.0316; rs850309: OR = 0.23, p = 0.03; rs3864098: OR = 1.53, p = 0.0383; rs698104: OR = 1.52, p = 0.0424; rs72549154: OR = 0.55, p = 0.0453). C9 (rs187875: OR = 1.46, p = 0.0189; rs700218: OR = 0.12, p = 0.0471) and C8A (rs11206934: OR = 4.02, p = 0.0323) encode proteins of the membrane attack complex (MAC) and C5AR1 (rs10404456: OR = 1.43, p = 0.0155), a potent anaphylatoxin-receptor. Two encode complement regulators: MAC-blocking CD59 (rs1047581: OR = 0.62, p = 0.0152) and alternative pathway-blocking CFH (rs34388368: OR = 2.57, p = 0.0195). One encodes opsonin: C3 (rs4807895: OR = 2.52, p = 0.0239), whereas four encode receptors for C3 fragments: CR1 (haplotype with rs6656401: OR = 1.37, p = 0.0382), CR2 (rs2182911: OR = 0.23, p = 0.0263), ITGAM (CR3, rs12928810: OR = 0.66, p = 0.0435), and ITGAX (CR4, rs11574637: OR = 0.63, p = 0.0056). Associations reinforced former findings, regarding differential gene expression, serum levels, C3, and MAC deposition on lesions. Deregulation of previously barely noticed processes, e.g., the lectin and alternative pathways and opsonization-mediated phagocytosis, also modulate PF susceptibility. The results open new crucial avenues for understanding disease etiology and may improve PF treatment through additional therapeutic targets. PMID:29686679
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Blind Data Attack on BGP Routers
2017-03-01
implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions
Research on high power intra-channel crosstalk attack in optical networks
NASA Astrophysics Data System (ADS)
Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan
2017-02-01
The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.
Warning Signs of Heart Attack, Stroke and Cardiac Arrest
... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...
The role of mental disorder in attacks on European politicians 1990-2004.
James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B
2007-11-01
The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.
Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.
2015-01-01
Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672
Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.
Method for Integrated Simulation (MINTSIM)
1976-01-01
sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Web Forms and Untraceable DDoS Attacks
NASA Astrophysics Data System (ADS)
Jakobsson, Markus; Menczer, Filippo
We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.
Replacement Attack: A New Zero Text Watermarking Attack
NASA Astrophysics Data System (ADS)
Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad
2017-03-01
The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Heartburn or Chest Pain: When Is It Heart Attack?
Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...
Know the Warning Signs of a Heart Attack
... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...
Kim, Kyoung Whun; Jeong, Soyoung; Ahn, Ki Bum; Yang, Jae Seung; Yun, Cheol-Heui; Han, Seung Hyun
2017-12-01
The vibriocidal assay using guinea pig complement is widely used for the evaluation of immune responses to cholera vaccines in human clinical trials. However, it is unclear why guinea pig complement has been used over human complement in the measurement of vibriocidal activity of human sera and there have not been comparison studies for the use of guinea pig complement over those from other species. Therefore, we comparatively investigated the effects of complements derived from human, guinea pig, rabbit, and sheep on vibriocidal activity. Complements from guinea pig, rabbit, and human showed concentration-dependent vibriocidal activity in the presence of quality control serum antibodies. Of these complements, guinea pig complement was the most sensitive and effective over a wide concentration range. When the vibriocidal activity of complements was measured in the absence of serum antibodies, human, sheep, and guinea pig complements showed vibriocidal activity up to 40-fold, 20-fold, and 1-fold dilution, respectively. For human pre- and post-vaccination sera, the most potent vibriocidal activity was observed when guinea pig complement was used. In addition, the highest fold-increases between pre- and post- vaccinated sera were obtained with guinea pig complement. Furthermore, human complement contained a higher amount of V. cholerae- and its lipopolysaccharide-specific antibodies than guinea pig complement. Collectively, these results suggest that guinea pig complements are suitable for vibriocidal assays due to their high sensitivity and effectiveness to human sera.
Percolation of localized attack on isolated and interdependent random networks
NASA Astrophysics Data System (ADS)
Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo
2014-03-01
Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.
NASA Astrophysics Data System (ADS)
JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu
2017-05-01
Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.
Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq
2015-01-01
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882
TANDI: threat assessment of network data and information
NASA Astrophysics Data System (ADS)
Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises
2006-04-01
Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.
Identifying and tracking attacks on networks: C3I displays and related technologies
NASA Astrophysics Data System (ADS)
Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.
2003-09-01
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.
Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads
2018-05-01
Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.
Shark attack-related injuries: Epidemiology and implications for plastic surgeons.
Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T
2016-01-01
The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.
Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment
Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.
2013-01-01
Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491
Adaptive optimisation-offline cyber attack on remote state estimator
NASA Astrophysics Data System (ADS)
Huang, Xin; Dong, Jiuxiang
2017-10-01
Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.
Public knowledge of heart attack symptoms in Beijing residents.
Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan
2007-09-20
Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.
Application distribution model and related security attacks in VANET
NASA Astrophysics Data System (ADS)
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
2013-03-01
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chu, Tsong L.
The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less
Improving the Rainbow Attack by Reusing Colours
NASA Astrophysics Data System (ADS)
Ågren, Martin; Johansson, Thomas; Hell, Martin
Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.
The Complement System in Dialysis: A Forgotten Story?
Poppelaars, Felix; Faria, Bernardo; Gaya da Costa, Mariana; Franssen, Casper F. M.; van Son, Willem J.; Berger, Stefan P.; Daha, Mohamed R.; Seelen, Marc A.
2018-01-01
Significant advances have lead to a greater understanding of the role of the complement system within nephrology. The success of the first clinically approved complement inhibitor has created renewed appreciation of complement-targeting therapeutics. Several clinical trials are currently underway to evaluate the therapeutic potential of complement inhibition in renal diseases and kidney transplantation. Although, complement has been known to be activated during dialysis for over four decades, this area of research has been neglected in recent years. Despite significant progress in biocompatibility of hemodialysis (HD) membranes and peritoneal dialysis (PD) fluids, complement activation remains an undesired effect and relevant issue. Short-term effects of complement activation include promoting inflammation and coagulation. In addition, long-term complications of dialysis, such as infection, fibrosis and cardiovascular events, are linked to the complement system. These results suggest that interventions targeting the complement system in dialysis could improve biocompatibility, dialysis efficacy, and long-term outcome. Combined with the clinical availability to safely target complement in patients, the question is not if we should inhibit complement in dialysis, but when and how. The purpose of this review is to summarize previous findings and provide a comprehensive overview of the role of the complement system in both HD and PD. PMID:29422906
Simulation of Attacks for Security in Wireless Sensor Network
Diaz, Alvaro; Sanchez, Pablo
2016-01-01
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710
ERIC Educational Resources Information Center
DePaoli, Jennifer; van Lier, Piet
2013-01-01
Ohio's charter-closure law is touted as one of the toughest in the nation because it requires the automatic closure of charter schools that consistently fail to meet academic standards. Ohio's charter-closure law, which became effective in 2008 and was revised in 2011, calls for automatic closure of schools rated in Academic Emergency for at least…
Slip slidin’ away of mitosis with CRL2Zyg11
2016-01-01
The spindle assembly checkpoint arrests mitotic cells by preventing degradation of cyclin B1 by the anaphase-promoting complex/cyclosome, but some cells evade this checkpoint and slip out of mitosis. Balachandran et al. (2016. J. Cell Biol. http://dx.doi.org/10.1083/jcb.201601083) show that the E3 ligase CRL2ZYG11 degrades cyclin B1, allowing mitotic slippage. PMID:27810907
Fundamentals of Physical Volcanology
NASA Astrophysics Data System (ADS)
Marsh, Bruce
2010-04-01
Fundamentals haunt me. Certain words ignite unavoidable trains of thought, trains that begin in a cascade, unexpectedly leaping chasm after chasm, rushing from single words to whole paragraphs to full books to men's lives. So it is with me with seeing the word “fundamental” in print. I cannot evade the euphoric excitement of thinking that someone has found something terribly original and simple, understandable by every journeyman, explaining everything.
2005-06-17
conventional military superiority of the U.S. presents significant operational challenges. Recovery forces are vulnerable conducting personnel recovery... forced to evade. In this strategic context, the military’s decision-making process with regard to personnel recovery is completely rational. 15...superiority of the U.S. presents significant operational challenges. Recovery forces are vulnerable conducting personnel recovery because the situation